archived
stringclasses
2 values
author
stringlengths
3
20
author_fullname
stringlengths
4
12
body
stringlengths
0
22.5k
comment_type
stringclasses
1 value
controversiality
stringclasses
2 values
created_utc
stringlengths
10
10
edited
stringlengths
4
12
gilded
stringclasses
7 values
id
stringlengths
1
7
link_id
stringlengths
7
10
locked
stringclasses
2 values
name
stringlengths
4
10
parent_id
stringlengths
5
10
permalink
stringlengths
41
91
retrieved_on
stringlengths
10
10
score
stringlengths
1
4
subreddit_id
stringclasses
1 value
subreddit_name_prefixed
stringclasses
1 value
subreddit_type
stringclasses
1 value
total_awards_received
stringclasses
19 values
null
LvlAndFarm
null
I'm stuck on Part 2, for the one column "ball" I simply link each register's set-low to the next's output, but when trying it out, they all consecutively turn red. Help/documentation would be great
null
0
1491396976
False
0
dfuywhx
t3_63jpev
null
null
t3_63jpev
null
1493814654
1
t5_2fwo
null
null
null
null
stevethegiantpenis
null
it's how they justify the purchase of their expensive toys.
null
0
1491397015
False
0
dfuyxef
t3_63jq8w
null
null
t1_dfuvdpv
null
1493814667
7
t5_2fwo
null
null
null
null
Helen___Keller
null
The standard of criminal law is "beyond all reasonable doubt". A reasonable doubt could be that this forum is also frequented by legitimate users, such as pentesters, security researchers, and sysadmins. Is this actually the case? Heck if I know. But it's not a crime until the state proves beyond all reasonable doubt he intended to sell to a criminal hacker. To be clear, the fact that the FBI arrested him probably does mean they have proof that can lead to an indictment. I'm just saying, advertising a product that could be used by bad people, on a forum that could be viewed by bad people, that's not good enough, because where do we draw the line ? Is it safe to advertise on /r/programming ? /r/netsec? What if it makes it to the front page where doubtless many hackers will see it?
null
0
1491397032
False
0
dfuyxsa
t3_63jq8w
null
null
t1_dfuxvfw
null
1493814672
2
t5_2fwo
null
null
null
null
[deleted]
null
damn the queen but she's so elderly and sweet looking
null
0
1491397043
False
0
dfuyy27
t3_63e1ws
null
null
t1_dfutgiv
null
1493814676
2
t5_2fwo
null
null
null
null
Scout1Treia
null
Now that I think about it, you've *really* lost me. What exactly do you think would be "hijacked"? Your computer? Well, that's worse than any keylogger. The intermediary between Microsoft's servers and you? Well, then internet instracture itself is under threat and you've got bigger problems. Microsoft's servers? Cause if someone's going to break into those, they could just 'hijack' windows update and do much, MUCH worse things to you or the average windows user.
null
0
1491397130
False
0
dfuz03t
t3_63jq8w
null
null
t1_dfuyiqz
null
1493814703
5
t5_2fwo
null
null
null
null
LPTK
null
Note that this is way more limited than RAII. In C++, I can make a _vector_ of files, and when I pop elements from it or when the whole vector goes away, the files are closed. Same thing for smart pointers, which allow to express resource ownership (which you can't do in C#).
null
0
1491397148
False
0
dfuz0iu
t3_63bxdl
null
null
t1_dfubvyo
null
1493814709
3
t5_2fwo
null
null
null
null
steamruler
null
Look up shift registers.
null
0
1491397153
False
0
dfuz0o0
t3_63jpev
null
null
t1_dfuywhx
null
1493814711
1
t5_2fwo
null
null
null
null
haze070
null
And using a RAT on computers you manage isn't illegal either.
null
0
1491397173
False
0
dfuz16l
t3_63jq8w
null
null
t1_dfuyvk3
null
1493814717
3
t5_2fwo
null
null
null
null
__thiscall
null
[removed to meet the diversity quota]
null
0
1491397274
1493524935
0
dfuz3lm
t3_63jq8w
null
null
t1_dfutpa5
null
1493814750
-2
t5_2fwo
null
null
null
null
0011002
null
You could disable the the System tray but I don't remember if it had a silent installation option or not. Never checked the process list.
null
0
1491397313
False
0
dfuz4jv
t3_63jq8w
null
null
t1_dfuxrpt
null
1493814762
3
t5_2fwo
null
null
null
null
tinfrog
null
The difference is the amount of firepower under your customers' control.
null
0
1491397338
False
0
dfuz55p
t3_63jq8w
null
null
t1_dfur1ts
null
1493814770
1
t5_2fwo
null
null
null
null
algorithmsAI
null
Don't know if you're serious, but I guess he uses IntelliJ IDEA
null
0
1491397382
False
0
dfuz67n
t3_63ddi5
null
null
t1_dfuynpr
null
1493814783
2
t5_2fwo
null
null
null
null
Mildan
null
It comes down to intend.
null
0
1491397386
False
0
dfuz6am
t3_63jq8w
null
null
t1_dfuvi4s
null
1493814784
0
t5_2fwo
null
null
null
null
Meatslinger
null
If that's how they want to play it, then the CEOs of Ford, Chevrolet, Buick, etc. need to be arraigned for the countless hundreds of thousands of deaths their vehicles are responsible for.
null
1
1491397448
False
0
dfuz7rd
t3_63jq8w
null
null
t3_63jq8w
null
1493814804
3
t5_2fwo
null
null
null
null
Leumashy
null
It's not the "intent" that matters. It's the fact that it exists. No, I don't think Microsoft is trying to steal my bank account information. But nefarious 3rd parties could exploit the pre-existing keylogger to steal my bank account information.
null
0
1491397478
False
0
dfuz8fn
t3_63jq8w
null
null
t1_dfuyf73
null
1493814813
-2
t5_2fwo
null
null
null
null
stupid_comment_above
null
A 400 pound hacker from New Jersey?
null
0
1491397582
False
0
dfuzayc
t3_63jq8w
null
null
t3_63jq8w
null
1493814848
1
t5_2fwo
null
null
null
null
Gagege
null
Also, I don't think "wear headphones" is an acceptable solution. I hate wearing headphones all day, but I have to. I think two work spaces is the proper solution: one workspace for collaboration and one (possibly shared) workspace for working in private.
null
0
1491397597
False
0
dfuzbbc
t3_63l7iv
null
null
t1_dfuyn2b
null
1493814853
33
t5_2fwo
null
null
null
null
twiggy99999
null
> its not malware It was used to record user input including live webcam footage without the webcam LED coming on, it had DDOS capabilities and would hide it's self from the running services list. I'm not sure what your definition of malware is but these certainly tick most of the boxes for me
null
0
1491397598
False
0
dfuzbcr
t3_63jq8w
null
null
t1_dfuv7v0
null
1493814853
5
t5_2fwo
null
null
null
null
[deleted]
null
>Academia kinda sucks. lol where did that come from?
null
0
1491397652
False
0
dfuzcni
t3_63k699
null
null
t3_63k699
null
1493814870
4
t5_2fwo
null
null
null
null
Scout1Treia
null
Nobody's asking about intent. Honestly, what **do** you think it does? What supposed exploitation potential do you think this has?
null
1
1491397757
False
0
dfuzf65
t3_63jq8w
null
null
t1_dfuz8fn
null
1493814903
1
t5_2fwo
null
null
null
null
twiggy99999
null
> Why aren't Google execs in jail Because Google don't market their product to criminals saying use our service to commit a crime. The case is about intent not the technical capabilities of the software
null
0
1491397817
False
0
dfuzgli
t3_63jq8w
null
null
t1_dfuxfpq
null
1493814923
4
t5_2fwo
null
null
null
null
LvlAndFarm
null
> shift registers I actually meant documentation on the simulator. What does the red that appears on the store and errors out? I don't even know what's the issue to be honest
null
0
1491397826
False
0
dfuzgsv
t3_63jpev
null
null
t1_dfuz0o0
null
1493814926
1
t5_2fwo
null
null
null
null
Meistermalkav
null
And again, it features the FBI's secret information. My money is they wanted to turn him into an unpaid worker, I mean, Informer, get controll over his botnet, and then use it to "defend against terrorism". He said no, and they go against him hard. The proper response would be to serve the NSA fucks with a warrent for building technology that was clearly created with a malicious intent, ram down their doors, and see what happens. In a perfect world, we would find out he has a mental disability ( autism or asbergers), and suddenly, we could turn this thing around and go, Okay, this is discrimination against the mentally handicapped, how fucking dare you you pigs.... But meh. After 99 % of their wished for coders self medicated with pot, the FBI seems back to reach out their hiring process and revert back to the old "either you work with us for below standart pay, or you go to assfuck jail, for as long as we want, because we did not like your attitude. "
null
0
1491397830
False
0
dfuzgwz
t3_63jq8w
null
null
t1_dfuuspu
null
1493814927
-6
t5_2fwo
null
null
null
null
Enumerable_any
null
> For that level of editor support, you'd need a much better type system than Elm's! Huh? Wouldn't the return type be sufficient to suggest functions which fit into the typed hole?
null
0
1491397855
False
0
dfuzhi4
t3_63kjfv
null
null
t1_dfuw1c2
null
1493814935
4
t5_2fwo
null
null
null
null
twiggy99999
null
Maybe he revoked the FBI license once he found they where using it for illegal activities and they got pissed?
null
0
1491397932
False
0
dfuzjg4
t3_63jq8w
null
null
t1_dfux8s9
null
1493814961
17
t5_2fwo
null
null
null
null
AllHailtheBeard1
null
I'm most reminded of that pre-Columnbine ad for a Tec-9, espousing how it was "fingerprint resistant" and had a threaded barrel. Still a gun that could be used for defense, but 'nudge nudge wink wink' had other capabilities. Tec-9 Source: http://www.vpc.org/studies/deadint.htm
null
0
1491397957
False
0
dfuzk1u
t3_63jq8w
null
null
t1_dfuwlyz
null
1493814969
7
t5_2fwo
null
null
null
null
billytheid
null
When a large 'hand gun' is designed with a large magazine, a large caliber and a one step alteration to fully automatic you have to ask why...
null
0
1491397983
False
0
dfuzkps
t3_63jq8w
null
null
t1_dfuy7d8
null
1493814977
-5
t5_2fwo
null
null
null
null
ChestBras
null
Or, the NSA.
null
0
1491398057
False
0
dfuzmji
t3_63jq8w
null
null
t1_dfur1ob
null
1493815002
2
t5_2fwo
null
null
null
null
hakkzpets
null
Not really. It would be like Smith & Wesson actively promoting their guns for illegal use.
null
0
1491398078
False
0
dfuzn21
t3_63jq8w
null
null
t1_dfuyvt8
null
1493815009
2
t5_2fwo
null
null
null
null
mushishi
null
Gradual typing is useful when adopting existing javascript project. Otherwise you often immediately configure that typing is mandatory.
null
0
1491398096
False
0
dfuznj4
t3_63kjfv
null
null
t1_dfuw1c2
null
1493815015
3
t5_2fwo
null
null
null
null
y90210
null
The readme files were included in the package. All files had their hashes included as being part of the hacking tool. That means all files are quarantined. It would be nice if you had basic knowledge of how antivirus programs worked before calling bullshit.
null
0
1491398107
False
0
dfuznt3
t3_63jq8w
null
null
t1_dfuyoeq
null
1493815018
6
t5_2fwo
null
null
null
null
[deleted]
null
[deleted]
null
0
1491398117
False
0
dfuzo18
t3_63jq8w
null
null
t1_dfuyi1f
null
1493815022
-2
t5_2fwo
null
null
null
null
NotUniqueOrSpecial
null
> What’s important is that version control is used. However, given that this is so common, I’m not convinced that this question has a place today. That's a terrible reason to remove the question. In fact, the ubiquity of version control these days only reinforces the need. Believe me, there are places that don't use VC. You *don't* want to work at those places given the choice. Don't just assume that because something is an easy best practice that it means everyone's doing the right thing. > When asked about the noise issues of open offices, the usual response is to just wear headphones. With noise cancelling technology, this is a reasonable fix in most cases, and the one I use often when I’m in a shared office. Unless you focus better when it's *quiet*, and *not* just when you can't hear talking. Other people find headphones (even some of the best ones) uncomfortable for long periods of time. Shared/enclosed working spaces for small teams are a reasonable trade-off in this regard. It allows for easy access to the people with whom you need frequent direct contact and still is much quieter than low-wall semi-open layouts. > As we have seen before though, [writing code during interviews] is so ubiquitous that I don’t think it’s worth including any longer. Again, ubiquity doesn't mean the rule is wrong and should be removed. Plenty of places still don't get this right. Otherwise, though, I'd say he's pretty spot on.
null
0
1491398123
False
0
dfuzo6p
t3_63l7iv
null
null
t3_63l7iv
null
1493815024
91
t5_2fwo
null
null
null
null
y90210
null
It had crossed my mind, but I was going and had no contacts and no background with the legal system at the time. I didn't know what it would take to win anything like that. Also proving that it's harmed my reputation and prevented me From getting a job seemed easy for then to deflect since I wasn't job hunting.
null
0
1491398242
False
0
dfuzr6k
t3_63jq8w
null
null
t1_dfuyk04
null
1493815064
3
t5_2fwo
null
null
null
null
want_to_want
null
It sounds like he's wishing for either prototypal inheritance, which was tried in JavaScript and found to be a bad idea, or entity component systems, which were tried in game development and found to be a good idea.
null
0
1491398246
False
0
dfuzr9z
t3_63lb23
null
null
t3_63lb23
null
1493815065
1
t5_2fwo
null
null
null
null
LBJSmellsNice
null
But gun nuts are saying "this gun does wonders to stop home invaders." If they were saying "this gun will do a great job of threatening hostages" then it's a bit different
null
0
1491398250
False
0
dfuzre7
t3_63jq8w
null
null
t1_dfuwhn4
null
1493815067
6
t5_2fwo
null
null
null
null
rawb0t
null
a better analogy to this would be if the gun creators were creating bullets that completely destroyed themselves on impact to hide their presence in the crime. and again, they still aren't marketed towards teenagers for the express intent of committing **murder**. either way, that's really a totally separate argument. im sure you're not nearly as active on hackforums as I am, if at all, so let me tell you: this guy was peddling it as malware. it was designed from the ground up to be used as malware. to commit cyber crime and cyber terrorism.
null
0
1491398279
False
0
dfuzs41
t3_63jq8w
null
null
t1_dfuzkps
null
1493815076
3
t5_2fwo
null
null
null
null
N-Bluth
null
The problem with the gun analogy is that guns are not marketed as tools to commit crimes. If you try to sell a gun with the serial number and rifling groves removed you will get arrested.
null
0
1491398316
False
0
dfuzt25
t3_63jq8w
null
null
t1_dfut7kt
null
1493815089
4
t5_2fwo
null
null
null
null
holyknight00
null
features don't make a software criminal, if criminal use is not permitted by the EULA of the software you are not responsible (as developer) for an unfair use of your licensed software. For the same reason you can't sue Teamviewer even if you can prove it was used as malware.
null
0
1491398318
False
0
dfuzt3i
t3_63jq8w
null
null
t1_dfuvcax
null
1493815089
-1
t5_2fwo
null
null
null
null
singularity2030
null
Except he didn't start doing that till after a colleague went down for something similar. And come on, did you look at the features and target audience? He knew what he was doing obviously.
null
0
1491398371
False
0
dfuzuel
t3_63jq8w
null
null
t1_dfur6hy
null
1493815107
1
t5_2fwo
null
null
null
null
rawb0t
null
Please forgive my ignorance, but do they still do that? Or were laws put in place afterwards (or cracked down on, etc) to prevent them from continuing that sort of marketing?
null
0
1491398376
False
0
dfuzujg
t3_63jq8w
null
null
t1_dfuzk1u
null
1493815109
3
t5_2fwo
null
null
null
null
Psyladine
null
Praise the Sun Microsystems Java gods?
null
0
1491398390
False
0
dfuzuxj
t3_6350ax
null
null
t1_dftlf42
null
1493815114
1
t5_2fwo
null
null
null
null
rawb0t
null
Okay, let's dissect his EULA then. Can you link me to it or post it?
null
0
1491398425
False
0
dfuzvt1
t3_63jq8w
null
null
t1_dfuzt3i
null
1493815126
3
t5_2fwo
null
null
null
null
viiralvx
null
Typing from mobile, so bear with me. I think it's wise to put the base url attribute on the client struct as well. Why? It allows you to use httptest in order to mock out your API in your tests. Personal preference of mine.
null
0
1491398467
False
0
dfuzww5
t3_63kqtu
null
null
t3_63kqtu
null
1493815140
1
t5_2fwo
null
null
null
null
nicksvr4
null
>“It’s like saying that if someone buys a handgun and uses it to rob a liquor store, that the handgun manufacturer is complicit.” Guess they haven't been paying attention to politics lately. They want that too. It's all bull though. Do manufacturers of lock picking kits get sued for people picking locks?
null
0
1491398478
False
0
dfuzx5y
t3_63jq8w
null
null
t3_63jq8w
null
1493815145
2
t5_2fwo
null
null
null
null
WhatUnicorn
null
Okay so if he gets charged , wouldnt the same logick go for gun manufactures , whoms guns have been used too school shootins or terror?
null
0
1491398488
False
0
dfuzxg2
t3_63jq8w
null
null
t3_63jq8w
null
1493815148
0
t5_2fwo
null
null
null
null
singularity2030
null
There are many legitimate alternatives. Why would they trust the tool with a Ddos botnet tab? I wouldn't put something like that anywhere near my business.
null
0
1491398516
False
0
dfuzy52
t3_63jq8w
null
null
t1_dfutpa5
null
1493815157
5
t5_2fwo
null
null
null
null
Radeh
null
They kinda do by saying it's encrypted...because that implies you are potentially marketing to people who have reasons to hide criminal conversations.
null
0
1491398531
False
0
dfuzyhu
t3_63jq8w
null
null
t1_dfuzgli
null
1493815162
-2
t5_2fwo
null
null
null
null
macegr
null
He did it after "a" malware author got in trouble, not "another" malware author got in trouble. His tool was no more malware than any other remote admin tool. Let's say you see a bunch of your neighbors get pulled over for minor driving infractions; not using a turn signal, license plate light out, air freshener too large, etc. Police pulling someone over all the time. They catch one person DUI. Just because you start doing daily inspections of your car and drive 10 and 2 following the letter of the law or even walk to work sometimes doesn't make you guilty of "another" DUI just because you're trying to be careful in a hostile environment. The FBI needs to show that he knowingly assisted in specific crimes. It's not as cut and dried as, say, a Presidential candidate asking another country to hack his political rival, which then happened.
null
0
1491398545
False
0
dfuzyvg
t3_63jq8w
null
null
t1_dfux5e8
null
1493815167
2
t5_2fwo
null
null
null
null
billytheid
null
I'm sure you're not as active on Martha's Cooking Adventures as I am so let me tell you: a gun designed specifically to be altered into a submachine gun and then sold as a self defence pistol isn't a great spatula but can be used as a pot stand.
null
0
1491398548
False
0
dfuzyxp
t3_63jq8w
null
null
t1_dfuzs41
null
1493815168
-2
t5_2fwo
null
null
null
null
cantwedronethatguy
null
Oh right.
null
0
1491398561
False
0
dfuzz8r
t3_63ddi5
null
null
t1_dfuz67n
null
1493815172
2
t5_2fwo
null
null
null
null
duckvimes_
null
Archive, for those who don't want to visit the site directly: http://archive.is/dzeXp
null
0
1491398565
False
0
dfuzzd2
t3_63jq8w
null
null
t1_dfuxu5d
null
1493815173
11
t5_2fwo
null
null
null
null
alecn1519
null
If anybody is interested in the court documents, I have been posting them on a tribute website: https://www.aeonhack.com
null
0
1491398676
False
0
dfv0290
t3_63jq8w
null
null
t3_63jq8w
null
1493815212
1
t5_2fwo
null
null
null
null
steamruler
null
>What does the red that appears on the store and errors out? I assume it's an error. Never got it. >I don't even know what's the issue to be honest Bad design. Again, look up shift registers ;)
null
0
1491398692
False
0
dfv02na
t3_63jpev
null
null
t1_dfuzgsv
null
1493815217
0
t5_2fwo
null
null
null
null
destinoverde
null
> From a syntax point of view, it is an improvement. Is not. I find it hard to read compare to even JS. Also syntax in the context of general purpose languages is irrelevant.
null
0
1491398725
False
0
dfv03im
t3_63eo3w
null
null
t1_dfuv4v1
null
1493815229
1
t5_2fwo
null
null
null
null
webauteur
null
// God creates the world World objWorld = new World(); // God greets his creation objWorld.Message = "Hello World!"; // God creates the uncanny and otherworldly World objOtherWorld = new World(); // God destroys the world objWorld.Destroy();
null
0
1491398877
False
0
dfv07fy
t3_63lb23
null
null
t1_dfuzr9z
null
1493815282
-1
t5_2fwo
null
null
null
null
rawb0t
null
I wish I could pull up his sales thread in a cache somewhere. It was very clear what the purpose of his malware was.
null
0
1491398925
False
0
dfv08no
t3_63jq8w
null
null
t1_dfuzyvg
null
1493815298
3
t5_2fwo
null
null
null
null
lastas1
null
Her*
null
0
1491398959
False
0
dfv09mh
t3_63auwj
null
null
t1_dft83lw
null
1493815311
1
t5_2fwo
null
null
null
null
kageurufu
null
AB or something most likely.
null
0
1491398966
False
0
dfv09sm
t3_63jq8w
null
null
t1_dfuyq9w
null
1493815313
1
t5_2fwo
null
null
null
null
bschug
null
My point is, it's in the nature of the tech community to converge to one place. There's a reason why, even within the US, the majority of tech companies are in silicon valley, not spread all over the county. If the US can no longer be this place, the tech community will move somewhere else. It won't decentralize.
null
0
1491398973
False
0
dfv09zq
t3_637m7q
null
null
t1_dfuxeqq
null
1493815316
1
t5_2fwo
null
null
null
null
AN_IMPERFECT_SQUARE
null
ha, first time seeing my country's TLD used like that
null
0
1491399005
False
0
dfv0auw
t3_63jq8w
null
null
t1_dfuu5vk
null
1493815327
2
t5_2fwo
null
null
null
null
thatmorrowguy
null
Sure, Kali Linux has about 10 different tools for various flavors of DoS attacks that are used by pen testers every day. You can probably find another dozen without even trying very hard on Github. There's a whole industry of people building really good tools for pen tests, vulnerability assessments, and code audits - many of which are used by law enforcement and intelligence agencies. That there are legitimate uses for hacking tools was never in question, and remote access utilities are an everyday fact of life for IT departments everywhere. However, a desktop support person trying to provide remote support to a user isn't going to be the same person looking for the ability to perform a security audit on that machine at the same time.
null
0
1491399084
False
0
dfv0cxi
t3_63jq8w
null
null
t1_dfuyq9w
null
1493815355
48
t5_2fwo
null
null
null
null
KevinCarbonara
null
I think not posting links to the daily beast is just basic etiquette to be honest.
null
0
1491399112
False
0
dfv0dns
t3_63jq8w
null
null
t1_dfuu5vk
null
1493815365
13
t5_2fwo
null
null
null
null
mirvnillith
null
I think the merge of tester and coder into developer is a bad thing. The "safety net" making coders sloppy isn't really a valid argument in a team. The tasks done are the team's and eveybody suffers from bad code (and if you don't call that out, the code itself us not your biggest issue). A team benefits greatly from a tester's skill/mind set and should be used up front (i.e. design with your tester for early input on testability and for test cases/plans being written next to the code). Coders can also test, but actual testers really bring value to the feedback loop (assuming they are in the team).
null
0
1491399123
False
0
dfv0dxw
t3_63l7iv
null
null
t3_63l7iv
null
1493815368
31
t5_2fwo
null
null
null
null
dumasymptote
null
Well can you center stuff vertically using CSS?
null
0
1491399153
False
0
dfv0erd
t3_63jq8w
null
null
t1_dfutbhf
null
1493815380
5
t5_2fwo
null
null
null
null
mirhagk
null
The problem is that there are many different things a readonly keyword could mean, especially when it's a reference. It could mean the reference itself can't be changed or it could mean that the value that the reference points to can't be changed. It's even more complicated when you introduce a collection. It could mean the reference to the collection can't be changed, or the collection itself can't be changed, or the items can't be changed. It's not totally obvious what the readonly keyword does, so it's not easy to make a language that does the obvious thing with it.
null
0
1491399208
False
0
dfv0g6u
t3_63k8ep
null
null
t1_dfux0pc
null
1493815398
7
t5_2fwo
null
null
null
null
holyknight00
null
I don't even know if his software has an EULA. I'm just clarifying that you can't claim a software is criminal or not based on the features it have. As a developer you are responsible just for the fair uses of your software, as they are detailed on your End User Agreement. If he don't have an EULA or his EULA doesn't mention what are the fair uses of his piece of software he's pretty fucked.
null
0
1491399222
False
0
dfv0giy
t3_63jq8w
null
null
t1_dfuzvt1
null
1493815403
1
t5_2fwo
null
null
null
null
mindzipper
null
it's not rocket science. anyone that knows anything about this stuff knew the second they said 'keylogger' and 'password catcher' then 'webcam' it was 100% developed for, and marketed to nefarious use. He only started removing those options and disabling licenses because he saw others doing this and they started going to jail for it so he panicked. This is also why people were harassing him. they were sold hacker tools then down the line the author blocked the.... hacking tools. christ there was a DDOS tab on the default install. there is 0% chance this was sold to or developed for legit activities and just because they can be used for those too is not a defense. Intent matters. I didn't know any of those details until reading the story and researching it. but i started researching before reading these comments because it was OBVIOUS from just reading the article this was a bullshit story and he was much more criminal than this stuff claimed
null
0
1491399259
False
0
dfv0hk8
t3_63jq8w
null
null
t1_dfuwp2q
null
1493815417
1
t5_2fwo
null
null
null
null
JuliettPapaRomeo
null
So what. Plenty of your "corporate monitor your employees" tools either do or make it trivially easy to do every single one of those things.
null
0
1491399275
False
0
dfv0i06
t3_63jq8w
null
null
t1_dfuw1tv
null
1493815423
1
t5_2fwo
null
null
null
null
mf_shroom
null
But that part is in the daily beast article: "Huddleston admits an acquaintanceship with Shames, who was known on HackForums as “Mephobia,” but bristles at the accusation that Net Seal was built for crime."
null
0
1491399284
False
0
dfv0i9z
t3_63jq8w
null
null
t1_dfuu5vk
null
1493815426
1
t5_2fwo
null
null
null
null
pure_x01
null
I don't like that tcp based protocols is the new standard for communicating with something that really should have been a dynamically loaded library
null
1
1491399306
False
0
dfv0iv8
t3_63kj5h
null
null
t3_63kj5h
null
1493815434
2
t5_2fwo
null
null
null
null
dasignint
null
This is why we can't have nice things. Don't worry about it. I'll just make a language where readonly does the actual obvious thing.
null
0
1491399329
False
0
dfv0jh1
t3_63k8ep
null
null
t1_dfv0g6u
null
1493815442
-8
t5_2fwo
null
null
null
null
psychyness
null
It was pretty clear to me his intent and the reason behind his actions. Especially at the price point he was asking, $25. It's a horrible business to get into since the people you are selling your product to are all going to be extremely familiar with pirating. Regardless, I don't know what a fair punishment would be. If you put the kid in jail for 3-6 months and told him if he fucked up again he'd be in for a very long-time, I have a feeling this kid would stay away from the market. His actions showed that he was afraid of the punishment as it is. But of course, they're going to try and get him locked up for 10-20 years which will just be a waste of tax payers money and the rest of this kids life. I wish our court system did a better job.
null
0
1491399347
False
0
dfv0jx7
t3_63jq8w
null
null
t1_dfuwlyz
null
1493815449
8
t5_2fwo
null
null
null
null
rawb0t
null
Examples?
null
0
1491399368
False
0
dfv0kiw
t3_63jq8w
null
null
t1_dfv0i06
null
1493815456
1
t5_2fwo
null
null
null
null
LvlAndFarm
null
http://imgur.com/LXTFclB Sorry for the weird linking, my brain is kinda scrambled now sooo I was confused. Though I think I understand now, because when the second store is set, the first's set low is set to high too, which means the first returns to low, and the second returns to low too, which makes the first's set-low high again, etc... Kinda an infinite loop, now I just gotta figure out how to fix it. I'm confused :/ I tried looking up shift registers, but they aren't much use, diagrams don't really point out any "set-low" sooo...
null
0
1491399368
False
0
dfv0kj3
t3_63jpev
null
null
t1_dfv02na
null
1493815457
1
t5_2fwo
null
null
null
null
kirfkin
null
Fair point. Was it added before or after he removed himself of the project? I'm just curious.
null
0
1491399462
False
0
dfv0n2q
t3_63jq8w
null
null
t1_dfv0cxi
null
1493815491
8
t5_2fwo
null
null
null
null
Leumashy
null
I have no idea what you are asking. Are you asking what a keylogger can theoretically do?
null
1
1491399470
False
0
dfv0nay
t3_63jq8w
null
null
t1_dfuzf65
null
1493815493
0
t5_2fwo
null
null
null
null
rox0r
null
> Taking the analogy a step further, it's like arresting Smith & Wesson as accomplices for murder via their handguns. i think if they sell directly to criminals on a forum asking for the best gun for murdering people during robberies. I'm not sure equating him with an arms dealer is the best analogy for convincing people he is innocent.
null
0
1491399483
False
0
dfv0no5
t3_63jq8w
null
null
t1_dfuyvt8
null
1493815498
1
t5_2fwo
null
null
null
null
blind99
null
That's why you sell your shit as "Security Testing Tools" but eveyone knows it's not used for that
null
0
1491399498
False
0
dfv0o3a
t3_63jq8w
null
null
t1_dfutfuv
null
1493815504
0
t5_2fwo
null
null
null
null
[deleted]
null
[deleted]
null
0
1491399532
False
0
dfv0ozp
t3_63gp3w
null
null
t1_dfuqx07
null
1493815515
1
t5_2fwo
null
null
null
null
rawb0t
null
This I can agree with. I think he gained some useful knowledge and experience from creating his malware and I think if they give him a few months and maybe probation, that he won't do it again. I think he could easily enter the corporate world now and be a useful member of society. He found an easy way to make money and let's be honest with ourselves: it'd be hard to turn that down. That said, I don't think they'll slap him with 10-20 years, either. Look at Blackshades. I think the author of that got hit with 5 years, and he was actively evading LEA in Moldova. One of my best friends was selling Blackshades for the author and he spent less than a year in prison. Now he's on probation and getting involved in malware analysis and helping call out malware authors.
null
0
1491399601
False
0
dfv0qvm
t3_63jq8w
null
null
t1_dfv0jx7
null
1493815541
3
t5_2fwo
null
null
null
null
simspelaaja
null
Rust kinda does that. Non-`mut` references and variables (or things they point to) can't be modified. Therefore you can safely pass around normal "mutable" lists, but the type system guarantees you can't push to them or modify any of their items without a mutable reference.
null
0
1491399717
False
0
dfv0u1s
t3_63k8ep
null
null
t1_dfux0pc
null
1493815583
3
t5_2fwo
null
null
null
null
macegr
null
I'm sure it was really damning evidence, much like the functions of third-party plugins that you love spamming in this thread so much.
null
0
1491399717
False
0
dfv0u1u
t3_63jq8w
null
null
t1_dfv08no
null
1493815583
-2
t5_2fwo
null
null
null
null
Scout1Treia
null
What do you think it does? This "keylogger" specifically. It doesn't seem to do anything that you aren't already doing. And if someone could presumably compromise your operating system to take control of it, well... they can do much more damage than trying to dick around with existing functions.
null
1
1491399763
False
0
dfv0ver
t3_63jq8w
null
null
t1_dfv0nay
null
1493815602
2
t5_2fwo
null
null
null
null
routebeer
null
Title is misleading. He wrote the tools that skiddies use to take advantage of exploits. He didn't write them to help people fix their security flaws.
null
0
1491399802
False
0
dfv0wgh
t3_63jq8w
null
null
t3_63jq8w
null
1493815615
-1
t5_2fwo
null
null
null
null
rawb0t
null
[If by third party you mean created by the same author, then sure](http://i.imgur.com/FW7eeIa.png) (in case you don't know, he was the same guy behind "Nimoru Software")
null
0
1491399908
False
0
dfv0zcn
t3_63jq8w
null
null
t1_dfv0u1u
null
1493815654
2
t5_2fwo
null
null
null
null
shadamedafas
null
Yep. The future is now.
null
0
1491399958
False
0
dfv10qy
t3_63jq8w
null
null
t1_dfv0erd
null
1493815673
8
t5_2fwo
null
null
null
null
zomgitsrinzler
null
I agree, to keep the tutorial simple I defined it as a constant.
null
0
1491400000
False
0
dfv11vx
t3_63kqtu
null
null
t1_dfuzww5
null
1493815688
1
t5_2fwo
null
null
null
null
boris_the_boris
null
I'm sorry but I fail to see the value in this writing. The author's ideas of programming in general and OOP in particular are much too vague to be of any use. I see what he is saying but it is too general to be useful, and sometimes even questionable. > I guess such a Wittgensteinian standard would be great for the open source programs. Please :-)
null
0
1491400065
False
0
dfv13p4
t3_63lb23
null
null
t3_63lb23
null
1493815713
8
t5_2fwo
null
null
null
null
Millkovic
null
Great article, but please remove the pictures — they belong to r/cringe
null
0
1491400122
False
0
dfv15c5
t3_63h7mg
null
null
t3_63h7mg
null
1493815735
2
t5_2fwo
null
null
null
null
nhumrich
null
I wonder what you think of WordPress. Obviously it must be a technology that nobody uses because it's pretty slow on both server and client.
null
0
1491400168
False
0
dfv16o5
t3_63c9e1
null
null
t1_dfszvgi
null
1493815753
2
t5_2fwo
null
null
null
null
[deleted]
null
[deleted]
null
0
1491400170
False
0
dfv16r9
t3_63jq8w
null
null
t1_dfuxgst
null
1493815755
0
t5_2fwo
null
null
null
null
dsffff22
null
Sorry but there are so many errors in the code. It's kinda awful. First of all you don't use http.Client, a client for a rest api should take RoundTripper as parameter. Don't repeat yourself and write a prepareRequest method where you set stuff like authentication header. Using this: fmt.Sprintf(baseURL+"/%s/todos/%d", s.Username, id) is also super awful because baseURL may contain pattern and you search for it like ages why the url fucked up. Atleast in general It's really bad habits doing this even If you know the contents of baseURL. Returning fmt.Errorf for an unexpected status code and handling content before checking the status code is already really bad. Esspecially with apis you want context what went wrong. Also you missed some fmt.Println in AddTodo, use a logging library instead and disable/enable logging when you want to see what goes wrong.
null
0
1491400174
False
0
dfv16w1
t3_63kqtu
null
null
t3_63kqtu
null
1493815756
3
t5_2fwo
null
null
null
null
AncientRickles
null
What an asshole; creating full featured software that allows for the remote administration of servers. What was he thinking... Time to go into the gun company exec's houses and arrest them for every murder ever, guys.
null
0
1491400194
False
0
dfv17fo
t3_63jq8w
null
null
t3_63jq8w
null
1493815763
-1
t5_2fwo
null
null
null
null
mike10010100
null
>it's in the nature of the tech community to converge to one place I really don't see any evidence to suggest this. Silicon Valley started in no small part due to Stanford University combined with a lot of cheap to lease land (due to Frederick Terman's contributions). I'd love to see some analysis for this claim that the tech community converges on one place.
null
0
1491400283
False
0
dfv19x9
t3_637m7q
null
null
t1_dfv09zq
null
1493815798
1
t5_2fwo
null
null
null
null
qubedView
null
> That means Bill Gates and Linus Torvalds are also criminally responsible That analogy really doesn't work, as Windows and Linux aren't purpose-built for criminal uses. While a RAT certainly *can* be used for legitimate administration, it's highly doubtful any single customer of his had legitimate purposes, and he likely knew. We don't know, so he deserves the benefit of the doubt, but it's highly unlikely the FBI would go for a prosecution without evidence of such. We'll need to wait and see.
null
0
1491400389
False
0
dfv1cxu
t3_63jq8w
null
null
t1_dfur1ob
null
1493815838
4
t5_2fwo
null
null
null
null
aaeme
null
The MS keylogger will presumably be storing/caching the data it collects on your computer to send elsewhere (and knowing MS it probably doesn't purge its local copy ever). The problem is that the data exists at all and that's all a hacker needs to get. Without MS's keylogger the hacker would need to install their own keylogger, avoid antivirus measures, wait for it to collect data and get at that data. Now, all the hacker needs to do is get at the data that MS has kindly collected for them. Someone being able to hack into the computer in the first place to get at the data is, as you say, a sign of a deeper problem (as would be someone being able to intercept/snoop on MS's keylogger sending the data) but, nevertheless, it is a goldmine of information on one convenient place (or stream) that would have to be gathered in a far more laborious fashion if it weren't for MS doing the hard work for them. That deeper problem of being vulnerable to hacks/snooping is far more of a hazard to you if you have MS's keylogger running.
null
1
1491400409
False
0
dfv1dj1
t3_63jq8w
null
null
t1_dfuz03t
null
1493815846
1
t5_2fwo
null
null
null
null
[deleted]
null
[deleted]
null
0
1491400459
False
0
dfv1exi
t3_63k8ep
null
null
t3_63k8ep
null
1493815867
1
t5_2fwo
null
null
null
null
AncientRickles
null
This is why it is really bad to have geriatric luddites in the legislative and judicial spheres deciding how cutting edge technology should be regulated by the law.
null
0
1491400477
False
0
dfv1fg4
t3_63jq8w
null
null
t1_dfuv5fj
null
1493815873
5
t5_2fwo
null
null
null
null
nhumrich
null
I totally agree. But if your familiar language is say, Java, wouldn't it be worth learning something like e Python so that when the day comes, you have something productive under your belt?
null
0
1491400549
False
0
dfv1hhl
t3_63c9e1
null
null
t1_dft2nd3
null
1493815902
2
t5_2fwo
null
null
null