archived
stringclasses
2 values
author
stringlengths
3
20
author_fullname
stringlengths
4
12
body
stringlengths
0
22.5k
comment_type
stringclasses
1 value
controversiality
stringclasses
2 values
created_utc
stringlengths
10
10
edited
stringlengths
4
12
gilded
stringclasses
7 values
id
stringlengths
1
7
link_id
stringlengths
7
10
locked
stringclasses
2 values
name
stringlengths
4
10
parent_id
stringlengths
5
10
permalink
stringlengths
41
91
retrieved_on
stringlengths
10
10
score
stringlengths
1
4
subreddit_id
stringclasses
1 value
subreddit_name_prefixed
stringclasses
1 value
subreddit_type
stringclasses
1 value
total_awards_received
stringclasses
19 values
null
rawb0t
null
I'm confused. Where did he say the evidence exists and is real? All he asked is how does /u/DunDunDunDuuun know what evidence exists? I mean I'm sure it does and is considering the FBI have admin-access accounts on HackForums, but I think it's silly for /u/DunDunDunDuuun to just assume they have zero evidence.
null
0
1491390414
1491391566
0
dfuvh6a
t3_63jq8w
null
null
t1_dfuuzez
null
1493812999
16
t5_2fwo
null
null
null
null
tehndrill
null
>They are probably *richer* than the average person.But still entry level. FTFY
null
0
1491390422
False
0
dfuvhbk
t3_63gbjx
null
null
t1_dfu4cuy
null
1493813001
5
t5_2fwo
null
null
null
null
Free_Math_Tutoring
null
Sorry, who? Googling doesn't really help me.
null
0
1491390466
False
0
dfuvhxt
t3_63jq8w
null
null
t1_dfutr3n
null
1493813009
10
t5_2fwo
null
null
null
null
josefx
null
Committing a crime can land you in prison, surprisingly actively helping others to commit a crime can also land you in prison.
null
0
1491390479
False
0
dfuvi4s
t3_63jq8w
null
null
t1_dfuuz2a
null
1493813011
20
t5_2fwo
null
null
null
null
rawb0t
null
What you may not know is that he only added those identifying marks and removed those features after another malware author got in a load of trouble. That's also why he ended up selling off his project.
null
0
1491390505
False
0
dfuvii0
t3_63jq8w
null
null
t1_dfuumfy
null
1493813016
7
t5_2fwo
null
null
null
null
theoldboy
null
Not really, unless "normal" developers are the in the habit of writing tools whose **intended use** is unlawful. That's what this case boils down to. PROTIP: Don't sell your lawful tools on HackForums.net
null
0
1491390508
False
0
dfuvik0
t3_63jq8w
null
null
t1_dfuq4rx
null
1493813018
10
t5_2fwo
null
null
null
null
Futakitty
null
Hackforums is a forum full of skid, the FBI knows the difference between that, and news aggregator linked to some startup incubator stuff.
null
0
1491390595
False
0
dfuvjtk
t3_63jq8w
null
null
t1_dfuqtni
null
1493813034
14
t5_2fwo
null
null
null
null
alek_hiddel
null
There are checks at a gun show. If you're a Federally licensed firearms dealer, you must paperwork/background check everyone no matter where you sale. As a private citizen, I can sell you one of my old guns (so long as I didn't buy it for the express purpose of resell) whether we're at a gun show, or your house, or anywhere, without paperwork.
null
0
1491390595
False
0
dfuvjtn
t3_63jq8w
null
null
t1_dfus3y4
null
1493813034
3
t5_2fwo
null
null
null
null
mallardtheduck
null
> How do YOU know? I don't. I never claimed to.
null
0
1491390596
False
0
dfuvjuc
t3_63jq8w
null
null
t1_dfuuzez
null
1493813035
6
t5_2fwo
null
null
null
null
sabas123
null
> John E. Hopcroft I remember him from my compiler text book.
null
0
1491390596
False
0
dfuvjuu
t3_63e1ws
null
null
t1_dftlq1h
null
1493813035
1
t5_2fwo
null
null
null
null
lpqm
null
I think it's pretty clear what they're trying to do here. If this guy gets convicted then they have precedent to arrest any software developer whose software is used illegally. I seriously doubt that they'll start arresting devs left and right though. Want they want is the ability to force devs into a plea bargain or some similar deal where they will give the feds backend access to their software. Basically this is happening so that next time Apple refuses to crack a phone for them, they can pull out the handcuffs until they do
null
1
1491390722
False
0
dfuvlnz
t3_63jq8w
null
null
t3_63jq8w
null
1493813059
0
t5_2fwo
null
null
null
null
roerd
null
Whether that is the case is appearently exactly the crucial question that should decide the judgement.
null
0
1491390852
False
0
dfuvnnn
t3_63jq8w
null
null
t1_dfuuikg
null
1493813085
1
t5_2fwo
null
null
null
null
Sir_Lith
null
Ironically, flexbox used in the picture is used to prevent the need for hacks in the CSS sense, as it allows for intuitive centering of elements...
null
0
1491391014
False
0
dfuvq3d
t3_63jq8w
null
null
t1_dfutbhf
null
1493813118
25
t5_2fwo
null
null
null
null
[deleted]
null
[deleted]
null
0
1491391019
False
0
dfuvq63
t3_63jq8w
null
null
t3_63jq8w
null
1493813119
1
t5_2fwo
null
null
null
null
tetyys
null
but the program is legit!! . . _posts program on hackforums_
null
0
1491391024
False
0
dfuvq8o
t3_63jq8w
null
null
t3_63jq8w
null
1493813120
5
t5_2fwo
null
null
null
null
AgainWitTheWhiteVans
null
ok, i concede i took this argument without really doing the leg work. Also in trying to do the leg work i realized its quite a deep hole and there is not a lot on google about nanocore other than its malware. I will say some of the arguments they make are weak but its still one sided. I am assuming the main site is a placeholder since its been taken down.
null
0
1491391065
False
0
dfuvqul
t3_63jq8w
null
null
t1_dfuvcax
null
1493813127
1
t5_2fwo
null
null
null
null
AbstractOperator
null
Any testimonial of legit use of his RAT ?
null
0
1491391133
False
0
dfuvrxo
t3_63jq8w
null
null
t3_63jq8w
null
1493813143
9
t5_2fwo
null
null
null
null
pala4833
null
So, you're definitely not, so going to so be a so English so instructor, so. So.
null
0
1491391218
False
0
dfuvtc4
t3_63kvj6
null
null
t3_63kvj6
null
1493813161
-3
t5_2fwo
null
null
null
null
Cilph
null
A scriptkiddy forum he hung around at the time he learned programming. Not exactly dark web shit.
null
1
1491391282
False
0
dfuvuaa
t3_63jq8w
null
null
t1_dfuv8gx
null
1493813174
0
t5_2fwo
null
null
null
null
gypsydrifter
null
Being a dumbass still isn't a crime though...
null
0
1491391291
False
0
dfuvufo
t3_63jq8w
null
null
t1_dfuuu40
null
1493813176
15
t5_2fwo
null
null
null
null
milesrout
null
>When consuming a REST API it's a good practice to write an API Client (API Wrapper) for yourself or your own REST API, so other users could more easily access it. Is it? If you have a really monstrous API I could understand that.
null
0
1491391302
False
0
dfuvulp
t3_63kqtu
null
null
t3_63kqtu
null
1493813178
1
t5_2fwo
null
null
null
null
NoLemurs
null
> So number of humans or number of computers is much too low an estimate. It's worth noting that we've got a factor of 2^15 wiggle room before that becomes an issue. Also, it seems pretty likely that no one is interested in devoting the necessary resources for a shot at getting a small randomly selected sample of ephemeral session keys. The concern still strikes me as pretty unrealistic.
null
0
1491391355
False
0
dfuvvey
t3_63g4ug
null
null
t1_dfuh41f
null
1493813189
1
t5_2fwo
null
null
null
null
meetingcpp
null
running clang tidy / modernize over the project should be able to fix these leaks...
null
0
1491391430
False
0
dfuvwl5
t3_63jhxx
null
null
t1_dfut3d1
null
1493813205
1
t5_2fwo
null
null
null
null
INTERNET_RETARDATION
null
He's the creator of the command line tool `curl` (and the backing library libcurl) which implements a whole lot of file transfer protocols which "hackers" can take advantage of. Unrelated to this, but he recently wrote a blog post defending the C programming language. People retorted with a list of security vulnerabilities in curl that were inherently caused by C itself.
null
0
1491391540
1491393596
0
dfuvyc2
t3_63jq8w
null
null
t1_dfuvhxt
null
1493813227
11
t5_2fwo
null
null
null
null
JoCoMoBo
null
So he passed the Turing test...?
null
0
1491391543
False
0
dfuvyds
t3_63e1ws
null
null
t3_63e1ws
null
1493813228
1
t5_2fwo
null
null
null
null
acdha
null
I'm not saying it's perfect rainbows and sunshine, just that when a trend is true across many people you should ask who's hiring them.
null
0
1491391663
False
0
dfuw0d3
t3_637m7q
null
null
t1_dfuiw7c
null
1493813255
1
t5_2fwo
null
null
null
null
milesrout
null
The thing is, I don't think people want `create-react-app` when they say 'web stuff is too complex'. What they want is something that is as easy as: <script src="cdn.example.net/react.js"></script> and can be made more complex, as you want it to be made more complex, if you want it to be made more complex. And that's what, in my experience at least, Vue offers. It's a simple Javascript library. It does basically what you'd expect. You can just chuck it in a src tag. You can gradually introduce things like `webpack` and `es6` and component-based architecture and all that. The benefit of jQuery, in simplicity, was that while it was a big monolithic library it didn't stop you from writing normal Javascript.
null
1
1491391673
False
0
dfuw0je
t3_63kcyy
null
null
t3_63kcyy
null
1493813257
-1
t5_2fwo
null
null
null
null
tngpc
null
that is so retarded America if they gonna arrest developers of RATs then should have picked the TeamViewer and LogMeIn since there the most common RAT used by scammers in India
null
0
1491391712
False
0
dfuw165
t3_63jq8w
null
null
t3_63jq8w
null
1493813265
-4
t5_2fwo
null
null
null
null
codebje
null
I've used both Atom and VScode with Elm. I honestly don't know if there's still no source maps, I don't do a whole lot of breakpoint-and-step debugging, I got out of the habit doing a bunch of lazy-eval code where it gets kind of strange. I did have a problem where I put in a debug trace (fancy speak for "chuck printfs everywhere and see what turns up") that was always happening, even when I could see success had occurred, and this was because Elm is strict - if you do something like: Maybe.withDefault (trace "took default branch" defaultValue) somePartialComputation ... then Elm will evaluate the `trace` expression whether it uses it or not, while I'm more used to having expressions only evaluated when they're needed. Autocomplete is definitely not on the level of, say, IntelliJ for Java or Visual Studio's IntelliSense for C#. But I think it [does OK](http://i.imgur.com/f9vNf71.png) - it searches in modules, it gives types and docstrings. It's not context aware, though, it can't give me more accurate suggestions based on the type of the hole in the expression I'm building. For that level of editor support, you'd need a _much_ better type system than Elm's! And you can see in the same shot that the error is also immediately highlighted. Also, that right there is me accessing the DOM, there are just rules about it, to keep the safety guarantees. By contrast, my only experience with TypeScript was trying to write a trivial extension for VScode, and that experience was abysmal - the default skeletal project structure had something like 180 warnings due to type problems, any actual issues with my code were invisible in that mess, and ... gradual typing, it's like having a safety line that's only attached on one end. edit: Atom wasn't all that good for Elm, VScode's language servers make a big difference.
null
0
1491391722
False
0
dfuw1c2
t3_63kjfv
null
null
t1_dfuv1u2
null
1493813267
5
t5_2fwo
null
null
null
null
rawb0t
null
Listen. The part where it gets really sketchy is that it isn't just some RA tool like TeamViewer, which lets you know that its running. Nanocore hides its process. It hides its installation procedure. It gives absolutely zero warning to the user that its running. This isn't just some corporate "monitor your employees" tool. It specifically has features for stealing passwords. It has DDOS features. It has a feature that disables the webcam light so perverts can spy on their victims.
null
0
1491391751
False
0
dfuw1tv
t3_63jq8w
null
null
t1_dfuvufo
null
1493813274
47
t5_2fwo
null
null
null
null
rawb0t
null
Listen. The part where it gets really sketchy is that it isn't just some RA tool like TeamViewer, which lets you know that its running. Nanocore hides its process. It hides its installation procedure. It gives absolutely zero warning to the user that its running. This isn't just some corporate "monitor your employees" tool. It specifically has features for stealing passwords. It has DDOS features. It has a feature that disables the webcam light so perverts can spy on their victims.
null
0
1491391763
False
0
dfuw1zm
t3_63jq8w
null
null
t1_dfur1ob
null
1493813276
5
t5_2fwo
null
null
null
null
chrisrazor
null
On the contrary, there appears to be evidence that he took steps to stop his software being used by criminals.
null
0
1491391826
False
0
dfuw30i
t3_63jq8w
null
null
t1_dfuuikg
null
1493813290
1
t5_2fwo
null
null
null
null
kyz
null
> It also tried to attack technical issues like the constant breakage of hyperlinks you get in HTML or the inability to quote a subsection of another HTML page. True, but that's a technical problem with a social solution: incentivise page owners to get URLs right the first time and keep them static, e.g. like search engines do (more Google-juice for long-lived URLs). Give them tools to find and fix broken links. It's not to let linked-to pages tell linking pages what the new address is. I don't know about you, but I would shit a brick if a page I linked to dialled back to my server and sent an `UPDATEURL http://www.innocentsite.com/kittens/ http://evilsite.com HTTP/1.0` request. MediaWiki has generally the right idea; renaming a page auto-generates a redirect from the old URL to the new one, and slowly but surely robots (authorised by page owners) update linking pages to point directly. Xanadu glossed over the main source of bit-rot. It's not that a site remains up and serving the same content using changed URLs, but that entire sites are abandoned and either their registrations lapse (NXDOMAIN) or worse they're taken over by domain spammers who don't serve the content you were expecting but do serve malware. Xanadu's plan was to keep all documents, indefinitely. It didn't have a plan for when page authors wanted to stop updating their pages. What if they handed them over to spammers in exchange for money? The same social problem would exist as exists in WWW - highly regarded URLs abuse the trust placed in them by people who link to them and sell out. Ultimately, I like the archive.org solution best. If you're looking at a web page last updated in 1997, and its links don't work, go back to the web in 1997 and see what *used* to be there. It's also why I like wikis, although they still ultimately control their history and can outright delete it if they really don't want people to see it. > True, but at the same time the idea wasn't all that wrong and parts of the Web are slowly going in the same direction. Youtube owns a pretty large part of the video distribution on the Web precisely because they respect copyright and are able to pay authors. The lone non-centralized video hosters do exist, but they are small fish compared to Youtube. The pendulum is swinging back the other way, and people are still trying to work out the best way to fund and distribute creative works, but I think most people are agreed they wouldn't want Xanadu's technical solution of absolute attribution and paying your ISP to hand out micropayments to page authors. Copyright does not guarantee anyone an income, just limited control over copying and distribution. Your example of Youtube - they don't make money because they "respect copyright", rather they make money because they have convinced an audience to combine watching authors' videos with watching/reading adverts. The advertisers get a benefit from people voluntarily watching their message, which would otherwise go unseen, and pay Youtube, who then share that with the video authors. Video authors also get paid through endorsing companies directly in their videos, and Youtube are experimenting with various other payment schemes, but pretty much nobody gets paid because they put a video on Youtube, choose what fee they want per view, and have people pay that fee (plus whatever extra their ISP wants to tack on) to watch it -- that was the model proposed by Xanadu, not just for videos but for every document on the entire internet. Youtube, as an entity, *don't* "respect copyright", they respect the legal departments of some large media companies, and have a system that goes above and beyond copyright law in order to placate these companies, and that's about as far as they go. Youtube are unable to technologically enforce copyright law in its full nuance, and so they don't. Xanadu would have faced the same problems, like how do you stop someone from re-typing a document instead of transcluding it? How does Youtube stop a determined video-copier from flipping, re-colouring, transforming audio on ilicitly copied videos so their automated system can't detect it's a copy? Xanadu would have the same cat-and-mouse game. Also, how could you *stop* someone getting paid when you make fair use of their e.g. hate-speech text in order to critique it? Many people copy text from hate-sites like the Daily Mail instead of linking, so they're not rewarded for their hate speech with ad impressions (or Xanadu access fees). They then rebut what those sites say. Would Xanadu try to combat this and enforce transclusion/attribution? Would that have a chilling effect on criticism? Copyright law lets you quote what is necessary (not necessarily the entire document) in order to criticise it, without requiring permission from or payment to the person you're quoting. What "is necessary" is only decidable by a judge looking at all the evidence, there is no hard and fast rule that a computer can apply. If Xanadu applied a blanket requirement that *any* quoting paid the quotee, would that shut down human discourse as people who oppose what's said are unable to quote it in their rebuttal out of principle? This is why law and copyright policy are best enforced by humans in courts rather than auto-enforced by software, which is why we should be glad Xanadu never succeeded.
null
0
1491391840
False
0
dfuw38f
t3_63e1ws
null
null
t1_dfuukeu
null
1493813293
4
t5_2fwo
null
null
null
null
anothdae
null
>Ooops - now he's still working on it and taking a cut from it, but loses any ability to police or dissuade anyone from using it for illegal purposes. Better hope the new owner is really a good guy, or by receiving profits and contributing code he could end up getting implicated in knowingly facilitating criminal activity. Not really an "oops". If the new guy developed it for hacking, that is on him. Just like how you don't sue stockholders when a company does something wrong. Unless they *prove* that he knew what was going on, they have even less of a case. It's the other guy on the line.
null
0
1491391912
False
0
dfuw4g3
t3_63jq8w
null
null
t1_dfuuu40
null
1493813310
3
t5_2fwo
null
null
null
null
eeue56
null
Your information seems to be out of date, the world of Elm tooling has improved a million times. > there was no proper autocomplete Every edtior I've used has proper autocomplete. Sublime, elm-light, atom, etc. > errors were not immediately highlighted in the editor Almost all the editors have errors in-line in the editor. I don't know of any without it, actually. > apparently there are no source maps, which makes debugging very complicated In Elm, you don't really need source maps. Debugging compiled Elm code very very rarely requires you to look at any of the JS. One of the benefits of no runtime exceptions. If you are trying to debug Elm by using Javascript techniques, you're going to have a bad time. Elm is not just a compile-to-JS language, it is quite different. > haven't seen the common navigation features (Ctrl+click, Find usages), etc. Again, used this in every editor I've tried. Here's the plugins: - [elm plugin for Sublime](https://github.com/elm-community/Elm.tmLanguage) - [elmjutsu for atom](https://atom.io/packages/elmjutsu) - [elm-light for lighttable](https://github.com/rundis/elm-light) - [vscode-elm for vscode](https://github.com/sbrink/vscode-elm)
null
0
1491391924
False
0
dfuw4n0
t3_63kjfv
null
null
t1_dfuv1u2
null
1493813312
9
t5_2fwo
null
null
null
null
KurrKurr
null
By the same logic they would have to incarcerate the owners of Colt, Glock, Remington, Walther, etc. Murderers use their "tools" to murder people!! Edit: Oh, they even use this analogy in the article. Sorry.
null
0
1491391975
False
0
dfuw5ht
t3_63jq8w
null
null
t3_63jq8w
null
1493813323
-2
t5_2fwo
null
null
null
null
zomgitsrinzler
null
Our inhouse statistics show that users are over 10x more likely to use an API Client/Wrapper than the REST API. I guess the REST api might sound scary to some, even when it's really simple.
null
0
1491391983
False
0
dfuw5lk
t3_63kqtu
null
null
t1_dfuvulp
null
1493813325
3
t5_2fwo
null
null
null
null
quad64bit
null
Yeah but what was in his breakfast bowl that was so crunchy?!?!
null
0
1491392046
False
0
dfuw6m1
t3_63jq8w
null
null
t3_63jq8w
null
1493813339
19
t5_2fwo
null
null
null
null
andrewcare
null
Can someone help me understand why I need this? I see this example: const inc = x => x + 1 // synchronous function const mul3 = x => x * 3 // synchronous function const div2promise = x => Promise.resolve(x / 2) // asynchronous function const mathFn = pipe( inc, div2promise, mul3 ) mathFn(5).then(console.log) // 5 + 1 / 2 * 3 = 9 and imagine this is the equivalent code without the library: const inc = x => x + 1 // synchronous function const mul3 = x => x * 3 // synchronous function const div2promise = x => Promise.resolve(x / 2) // asynchronous function Promise.resolve(5) .then(inc) .then(div2promise) .then(mul3) .then(console.log) Am I missing something?
null
0
1491392152
1491392360
0
dfuw8eo
t3_63kn24
null
null
t3_63kn24
null
1493813362
1
t5_2fwo
null
null
null
null
Poddster
null
Your agenda pushing is pretty boring.
null
0
1491392159
False
0
dfuw8je
t3_63jq8w
null
null
t1_dfuuo5e
null
1493813364
1
t5_2fwo
null
null
null
null
Cilph
null
I don't have an agenda. I'm just pointing out the hypocrisy. I like airsoft.
null
0
1491392194
False
0
dfuw954
t3_63jq8w
null
null
t1_dfuw8je
null
1493813372
1
t5_2fwo
null
null
null
null
y90210
null
"The court filings don’t detail why the government is so certain that Huddleston wanted to help hackers, but **the indictment mentions eight times the name of the website where Huddleston announced and supported NanoCore: HackForums.net**" But the article later says he actively worked to stop illegal use. The question is if those statements were for show in public posts or if this is overreach by the government. I had something similar happen to me in 2000. Hackers took my open source IRC chat robot written in C, and started to use it to remotely control hacked machines. Eventually anti virus companies added the file hashes as hacking tools and added my name as a virus creator. I found out about it because my local windows desktop suddenly started to delete my source code and readme files. But in my case, I wasn't promoting it on hacking forums.
null
0
1491392242
1491392631
0
dfuw9xv
t3_63jq8w
null
null
t1_dfur1ob
null
1493813383
6
t5_2fwo
null
null
null
null
rawb0t
null
Because he specifically marketed it towards people using it for malicious intent. He didn't start banning licenses until after one of his competitors got into a load of shit for the same thing. He got scared and started backpedaling.
null
0
1491392281
False
0
dfuwakn
t3_63jq8w
null
null
t1_dfutxhu
null
1493813392
6
t5_2fwo
null
null
null
null
[deleted]
null
[deleted]
null
0
1491392299
False
0
dfuwavw
t3_63jq8w
null
null
t1_dfuuf1x
null
1493813395
1
t5_2fwo
null
null
null
null
rawb0t
null
Yeah how dare they protect us from malware developers
null
0
1491392320
False
0
dfuwb7q
t3_63jq8w
null
null
t1_dfuuyhi
null
1493813400
4
t5_2fwo
null
null
null
null
rawb0t
null
A lot of people in this thread don't seem to understand that the guy specifically marketed his tool towards people trying to use it illegally. He hid the process. There's literally zero notification it's installed or even running. There's features for stealing passwords, DDOSing, and even disabling the webcam light so perverts can spy on their victims.
null
0
1491392421
False
0
dfuwcxy
t3_63jq8w
null
null
t1_dfuvlnz
null
1493813423
8
t5_2fwo
null
null
null
null
codebje
null
Beware services of type `NodePort`, anyone with a port scanner will find and abuse your service. For something like ELK with no OTB security model, this is a big deal. TFA's "simple" ES service does the right thing, but the other ES service in the repo doesn't - just be careful. If you're a Google sort of person, steps 1 and 2 are "click on 'launch cluster'" - I found kops a bit flaky.
null
0
1491392452
False
0
dfuwdgj
t3_63kgbx
null
null
t3_63kgbx
null
1493813430
1
t5_2fwo
null
null
null
null
rawb0t
null
Except that TeamViewer and LogMeIn don't hide their process and startup procedures nor do they have tools for stealing passwords and DDOSing.
null
0
1491392470
False
0
dfuwdsi
t3_63jq8w
null
null
t1_dfuw165
null
1493813435
6
t5_2fwo
null
null
null
null
haze070
null
Alot of gun companies advertise the guns usage for home defense, concealed carry, usage by LEOs and military. This is basically advertising hey our guns _can_ be used to kill. That doesn't mean they are responsible for when someone illegally kills someone with their gun
null
0
1491392508
False
0
dfuwef9
t3_63jq8w
null
null
t1_dfuuwn7
null
1493813443
3
t5_2fwo
null
null
null
null
rawb0t
null
Do those companies also market to teenagers about how good their tools are for murdering specifically?
null
0
1491392510
False
0
dfuweh3
t3_63jq8w
null
null
t1_dfuw5ht
null
1493813444
7
t5_2fwo
null
null
null
null
no-fun-at-parties
null
No crime can ever be prosecuted because any evidence could be fake. Well, boys and girls, you heard it here first. Time to shut down the courts!
null
0
1491392512
False
0
dfuweht
t3_63jq8w
null
null
t1_dfuuzez
null
1493813444
3
t5_2fwo
null
null
null
null
epicwisdom
null
Unawareness of const references?
null
0
1491392517
False
0
dfuwel1
t3_63jhxx
null
null
t1_dfuuon6
null
1493813445
3
t5_2fwo
null
null
null
null
wnmre
null
hey thanks for the feedback! You were right, there was a lot of redundant information, too spread out, and not enough focus on the important stuff. I removed a lot of fields, and updated to template to make it more concise. this template is just a demo, though, to show of all sections that are possible, thats why its so long. A real world résumé using this template, would probably be way shorter...
null
0
1491392534
False
0
dfuwev2
t3_635h86
null
null
t1_dfrj06l
null
1493813450
1
t5_2fwo
null
null
null
null
Homel523306
null
>He built a piece of software. That tool was pirated and abused by hackers. Now the feds want him to pay for the computer crooks’ crimes. **computer crooks**
null
0
1491392551
False
0
dfuwf63
t3_63jq8w
null
null
t3_63jq8w
null
1493813453
1
t5_2fwo
null
null
null
null
hideouspete
null
To use the gun analogy: nobody is arguing whether the manufacture of a gun or a gun itself is legal. Anybody can make a gun (in the US). It is the sale and how you sell it which is highly regulated and what makes you legally culpable. If I make a gun and sell it to Joe down the street for $100 cash without the proper licenses and paperwork, then Joe kills someone with it, yes 100% I am legally culpable and will be prosecuted, even if I told Joe not to shoot anyone with it. The more interesting facet of this case is will it spark a conversation about regulating the sale of these kinds of tools? They are undoubtedly dangerous and should the government put laws in place to regulate the sale and distribution of certain kinds of software?
null
0
1491392560
False
0
dfuwfc8
t3_63jq8w
null
null
t3_63jq8w
null
1493813455
4
t5_2fwo
null
null
null
null
Jaredismyname
null
Who sells a tool designed to hack into things then gets pissed that hackers use it?
null
0
1491392575
False
0
dfuwfkh
t3_63jq8w
null
null
t1_dfuw1tv
null
1493813459
4
t5_2fwo
null
null
null
null
DoListening
null
I'm basing most of what I wrote on what I saw in the OP video (the author is using the Sublime Text plugin). Glad to hear it's better than I thought. Not sure about the debugging part - it may be true that you get no runtime exceptions, but you may still want to look at the values of your data, or see which code paths get run and why, etc. I'm probably going to try Elm in the near future on some toy project, so I'll see for myself.
null
0
1491392582
False
0
dfuwfo5
t3_63kjfv
null
null
t1_dfuw4n0
null
1493813460
5
t5_2fwo
null
null
null
null
Jaredismyname
null
If he was still doing programing and was still paying attention he would know if the other programmer was making shady things easier to do.
null
0
1491392638
False
0
dfuwgm6
t3_63jq8w
null
null
t1_dfuw4g3
null
1493813472
3
t5_2fwo
null
null
null
null
rawb0t
null
Exactly. One thing I see people saying here is that he disabled licenses where he realized they were being used unlawfully -- but that wasn't true at first. He only did that after one of his competitors got into an assload of trouble. He was just trying to save his ass. That's why he sold his project off, as well.
null
0
1491392647
False
0
dfuwgqe
t3_63jq8w
null
null
t1_dfuwfkh
null
1493813474
12
t5_2fwo
null
null
null
null
zhensydow
null
Yes, why? it is soooo easy to put every naked pointer into a unique_ptr or a shared_ptr
null
0
1491392648
False
0
dfuwgr2
t3_63jhxx
null
null
t1_dfut3d1
null
1493813474
3
t5_2fwo
null
null
null
null
frankfoda
null
I've thorn between using Django Rest Framework for this new project at work, or trying Golang again, maybe with a framework instead of 10 tiny libraries... :) I love using Go, building, deploying, but its too much typing, specially in the prototyping phase. Do you feel my pain?
null
0
1491392658
False
0
dfuwgy3
t3_63kqtu
null
null
t1_dfuw5lk
null
1493813477
1
t5_2fwo
null
null
null
null
Jaredismyname
null
> Listen. The part where it gets really sketchy is that it isn't just some RA tool like TeamViewer, which lets you know that its running. Nanocore hides its process. It hides its installation procedure. It gives absolutely zero warning to the user that its running. This isn't just some corporate "monitor your employees" tool. It specifically has features for stealing passwords. It has DDOS features. It has a feature that disables the webcam light so perverts can spy on their victims.
null
0
1491392669
False
0
dfuwh56
t3_63jq8w
null
null
t1_dfuva3b
null
1493813479
2
t5_2fwo
null
null
null
null
jogai-san
null
> Can be easily combined with cashing Nice feature. Does it cache though?
null
0
1491392674
False
0
dfuwh7y
t3_63dwlp
null
null
t3_63dwlp
null
1493813480
1
t5_2fwo
null
null
null
null
wnmre
null
yes, you're right. making sure this is printable, is important, and needs to be improved. Yet, this template is also mobile friendly, which I think will be more important in the future.
null
0
1491392676
False
0
dfuwh8q
t3_635h86
null
null
t1_dfrj1xz
null
1493813481
2
t5_2fwo
null
null
null
null
ProgramAllTheThings
null
Gun nuts talk about stopping power all the time...
null
0
1491392700
False
0
dfuwhn4
t3_63jq8w
null
null
t1_dfuuwn7
null
1493813486
0
t5_2fwo
null
null
null
null
davorzdralo
null
Wow, you people are fucking nuts. How in the world do you even imagine this being anything except a PR problem?
null
0
1491392702
False
0
dfuwhob
t3_63jq8w
null
null
t1_dfuuwn7
null
1493813486
-2
t5_2fwo
null
null
null
null
Jaredismyname
null
Pretty sure that encouraging people to muder someone is not legal.
null
0
1491392735
False
0
dfuwi8u
t3_63jq8w
null
null
t1_dfuuhcg
null
1493813494
3
t5_2fwo
null
null
null
null
buffyfan69
null
More people ought to read this.
null
0
1491392770
False
0
dfuwiwi
t3_63jq8w
null
null
t1_dfuu5vk
null
1493813503
-6
t5_2fwo
null
null
null
null
Jaredismyname
null
The gun manufacturer is not going on a gang forums advertising how good it is then getting pissed off that the gangs used it.
null
0
1491392794
False
0
dfuwjbp
t3_63jq8w
null
null
t1_dfuw954
null
1493813509
4
t5_2fwo
null
null
null
null
Futakitty
null
TeamViewer doesn't have a built in password stealer and DDoS capabilities.
null
0
1491392821
False
0
dfuwjt9
t3_63jq8w
null
null
t1_dfutot1
null
1493813515
2
t5_2fwo
null
null
null
null
Jaredismyname
null
>The fact that he included a keylogger, webcam surveillance, and originally password stealing features is pretty telling though. I don't think he should be held responsible for everything people did with his software but he definitely knew what he was creating.
null
0
1491392835
False
0
dfuwk2h
t3_63jq8w
null
null
t1_dfuvuaa
null
1493813518
5
t5_2fwo
null
null
null
null
Jaredismyname
null
>The fact that he included a keylogger, webcam surveillance, DDos and originally password stealing features is pretty telling though. I don't think he should be held responsible for everything people did with his software but he definitely knew what he was creating.
null
0
1491392936
False
0
dfuwlv1
t3_63jq8w
null
null
t1_dfur4v8
null
1493813542
3
t5_2fwo
null
null
null
null
rawb0t
null
This thread is frustrating the hell out of me. Most of you likely aren't members of HackForums so let me lay some things out for you: >"What about TeamViewer and LogMeIn? Those are RA tools, too!" The difference is that TV and LMI don't hide their processes. They don't hide their installation procedures. They don't have features for stealing the users' (or in Nanocore's case, the victims') passwords or using their systems to perform DDOS attacks. They don't have a feature to disable the webcam light so that perverts can spy on their victims without the victims knowing. >"The article says he disabled licenses where he found the user to be using it unlawfully!" Yes, but not at first. He only started doing that *after* one of his competitors got in a world of trouble. It's literally just him backpedaling and trying to cover his ass. That's also why he ended up selling his project away. >"Guns, knives, etc!" Guns and knives aren't marketed towards teenagers for the express intent of committing *murder*. Nanocore was marketed to hacking people, and doing it without their consent.
null
0
1491392942
False
0
dfuwlyz
t3_63jq8w
null
null
t3_63jq8w
null
1493813544
49
t5_2fwo
null
null
null
null
kace91
null
> The software allows you to disable the webcam light, Aren't those supposed to be turned on when the camera is used by hardware design?
null
0
1491392946
False
0
dfuwm1v
t3_63jq8w
null
null
t1_dfuso8k
null
1493813545
3
t5_2fwo
null
null
null
null
Cilph
null
Switching from guns to videogame emulation - there's plenty of people who release hacks/exploits for consoles with the goal of running homebrew. Then proceed to post their releases on forums with active piracy discussion. They then get angry people attempt to use it for piracy and leave the scene in a huff. :rolleyes:
null
0
1491392951
False
0
dfuwm4w
t3_63jq8w
null
null
t1_dfuwjbp
null
1493813546
1
t5_2fwo
null
null
null
null
eeue56
null
Yeah, definitely the best way to play around is to try it out yourself. Generally, if you want to see values of your data, you're better off using `Debug.log` or just using the debugger. Very rarely do I find myself needing anything else. Because of the way data flow happens, debugging is a much nicer experience than needing to keep state in your head. If you do get stuck when trying out, come join our [Slack](https://elmlang.slack.com) and we can help you out!
null
0
1491392963
False
0
dfuwmd4
t3_63kjfv
null
null
t1_dfuwfo5
null
1493813549
3
t5_2fwo
null
null
null
null
lvaruzza
null
Was him hacking Arya Stark?
null
0
1491392993
False
0
dfuwmvn
t3_63jq8w
null
null
t3_63jq8w
null
1493813556
-1
t5_2fwo
null
null
null
null
zomgitsrinzler
null
Static typing is an acquired taste. It can feel limiting when coming from Python but you'll likely grow to love it.
null
0
1491393018
False
0
dfuwnb4
t3_63kqtu
null
null
t1_dfuwgy3
null
1493813561
3
t5_2fwo
null
null
null
null
ellaluna4tv
null
His approach is the naive one, where one assumes that the language will work as english does: just line up the words and you have a sentence. But as you said, finnish doesn't work that way at all (AFAIK), neither do latin or russian where the words can't be simply lined up, they change -sometimes heavily- according to the context of the sentence. Also if he wanted the most commonly used words (or rather roots) in the language, they're already all on memrise.
null
0
1491393024
False
0
dfuwnfl
t3_63e2b5
null
null
t1_dftrgqu
null
1493813563
1
t5_2fwo
null
null
null
null
LacksAgency
null
Ads are one thing. Malware is a whole nother ballgame.
null
0
1491393070
False
0
dfuwob3
t3_63jq8w
null
null
t1_dfuv2zi
null
1493813575
1
t5_2fwo
null
null
null
null
docholiday
null
What is really amazing is how easy people's opinion's are influenced with a "fake news" story. Read this forum for a bit more to the story: https://lobste.rs/s/ncnsli/fbi_arrests_hacker_who_hacked_no_one Pretty much everything you watch and read has been crafted to get you think a certain way. In the old days it was called propaganda.
null
0
1491393113
False
0
dfuwp2q
t3_63jq8w
null
null
t3_63jq8w
null
1493813585
10
t5_2fwo
null
null
null
null
zekt
null
This is how the spooks recruit.
null
0
1491393189
False
0
dfuwqgu
t3_63jq8w
null
null
t3_63jq8w
null
1493813603
-1
t5_2fwo
null
null
null
null
S-O-What
null
And there you have reasonable doubt established. If this was a private lawsuit by people damaged by NanoCore, his ass would be nailed to the wall. But if he can prove he tried to disable illegitimate users? Yeah, that's not going to hold up well for the prosecution. But there will probably be a plea deal long before that.
null
0
1491393190
False
0
dfuwqhc
t3_63jq8w
null
null
t1_dfuu785
null
1493813603
1
t5_2fwo
null
null
null
null
LtAramaki
null
You should watch "Lord of War". The leading character used this logic to arm kids on both sides in war zones, letting them kill each other, while he was laughing all the way to the bank. **Intent matters.** If you're creating a kitchen knife, which is so comfortable for slicing tomatoes, but very impractical to carry on your person and fight with, and then you sell your knife through cooking infomercials, you're not quilty when someone gets stabbed. When you're creating a pocket retractable blade knife, optimized for hand-to-hand combat and you're going to the ghetto to sell it to teenage gangs and tell them it's a wonderful low-cost self-defense and offense weapon, you are guilty when someone gets stabbed.
null
0
1491393219
False
0
dfuwqz2
t3_63jq8w
null
null
t1_dfutmwg
null
1493813610
7
t5_2fwo
null
null
null
null
BoredPudding
null
Creator of curl. Curl / libcurl is on basically any device in the world. Most software also makes use of curl / libcurl, so most hacking software will also use curl.
null
0
1491393253
False
0
dfuwrlf
t3_63jq8w
null
null
t1_dfuvhxt
null
1493813619
4
t5_2fwo
null
null
null
null
This_Is_The_End
null
There was an Italian company who got hacked. They sold a similar software to governments to spy on their own citizens. Even selling the software to Saudi Arabia didn't harmed the business. Only the publication of their customers bankrupted the company.
null
0
1491393303
False
0
dfuwsj1
t3_63jq8w
null
null
t1_dfutjpq
null
1493813632
2
t5_2fwo
null
null
null
null
skizmo
null
nobody likes lists.
null
0
1491393324
False
0
dfuwsw4
t3_63l0xz
null
null
t3_63l0xz
null
1493813636
4
t5_2fwo
null
null
null
null
Altourus
null
In the article they mention evidence of posts and blocked keys for when people illegally abused his tool and clear disclaimers against illegal use. Should be straight forward for his lawyers to prove his innocence. .
null
1
1491393342
False
0
dfuwt7v
t3_63jq8w
null
null
t1_dfuulq3
null
1493813641
1
t5_2fwo
null
null
null
null
BoredPudding
null
The last part isn't really related to this. It's more that a lot of hacking software is likely using curl. If curl can be hacked or not, is not related to this discussion.
null
0
1491393350
False
0
dfuwtdl
t3_63jq8w
null
null
t1_dfuvyc2
null
1493813643
4
t5_2fwo
null
null
null
null
noiserr
null
Plus the article mentions a keylogger being one of the plugins for his software. Keylogging in my opinion is pretty nefarious. Can't really think of legitimate uses for it that aren't criminal.
null
1
1491393391
False
0
dfuwu39
t3_63jq8w
null
null
t1_dfuuspu
null
1493813652
5
t5_2fwo
null
null
null
null
CriminalMacabre
null
Does the program have an EULA? Yes then if he's convicted we can basically wipe our collective asses with microsoft or apple EULAs. Tell that to the judge.
null
0
1491393409
False
0
dfuwuef
t3_63jq8w
null
null
t3_63jq8w
null
1493813656
0
t5_2fwo
null
null
null
null
S-O-What
null
It's about the intent of the author. TeamViewer doesn't explicitly market itself to scammers, so they're not on the hook there.
null
0
1491393413
False
0
dfuwuh2
t3_63jq8w
null
null
t1_dfuw165
null
1493813657
3
t5_2fwo
null
null
null
null
INTERNET_RETARDATION
null
Yeah, I didn't think about that, but that makes sense. Edited my reply.
null
0
1491393418
False
0
dfuwujq
t3_63jq8w
null
null
t1_dfuwtdl
null
1493813658
0
t5_2fwo
null
null
null
null
Shaper_pmp
null
There are areas where it shades into criminal negligence, though, which *is* a crime. Also, the dumbass defence assumes a judge/jury believes he *is* a dumbass, and not just a very clever technically gifted programmer with a clear interest in illegal hacking who's claiming ignorance as a fig-leaf excuse to avoid prosecution. I don't know which of those he is (most likely, somewhere in the middle), but which you buy makes a big difference whether this prosecution is justified or not.
null
0
1491393430
1491409004
0
dfuwusj
t3_63jq8w
null
null
t1_dfuvufo
null
1493813661
6
t5_2fwo
null
null
null
null
Jaredismyname
null
I am going to guess that most people don't get their identity stolen by emulators though.
null
0
1491393431
False
0
dfuwut0
t3_63jq8w
null
null
t1_dfuwm4w
null
1493813661
3
t5_2fwo
null
null
null
null
withabeard
null
It's an easy point to make. But a difficult one to really back up. He learned the techniques used to write the software on that forum. He has relationships with people there. He has a marketplace not already saturated with multi-million dollar companies. It's a very hard market for a struggling small business to pass up. Whether morally he should or not is one thing, but I can see why he chose to continue. What the article doesn't say is if he tried to sell the product elsewhere and in more legitimate locations. I compare it to someone running a market stall in a small marketplace known for shady dealings. The market being the only one cheap enough for them to operate until they have the capital to move to a shop front or similar. It's not ideal, but it's hardly without comparison.
null
0
1491393453
False
0
dfuwv8s
t3_63jq8w
null
null
t1_dfutmk0
null
1493813668
0
t5_2fwo
null
null
null
null
milesrout
null
It's also wrong.
null
0
1491393474
False
0
dfuwvnx
t3_63dch7
null
null
t1_dftxym2
null
1493813674
0
t5_2fwo
null
null
null
null
Munstered
null
Ask Windows 10 about keyloggers.
null
0
1491393527
False
0
dfuwwlq
t3_63jq8w
null
null
t1_dfuwu39
null
1493813688
64
t5_2fwo
null
null
null
null
Kodix
null
Monitoring kids, your own computer, or work computers. Most of those are pretty borderline though.
null
0
1491393533
False
0
dfuwwpb
t3_63jq8w
null
null
t1_dfuwu39
null
1493813689
34
t5_2fwo
null
null
null
null
BoredPudding
null
Even the blog part isn't related to it. It's just that he is the creator of curl / libcurl, and most hacking tools are likely using curl / libcurl. The recent blogs about security and languages don't have any influence on this.
null
0
1491393580
False
0
dfuwxl0
t3_63jq8w
null
null
t1_dfuwujq
null
1493813700
2
t5_2fwo
null
null
null