|
Sander Rossel wrote: I am kind of interested in what all the fuzz is about
If one develops code, anywhere, then one should consider how relevant source control and back up are. The two are not the same.
If one decides that either is prudent then one must then decide on a solution for that.
Github fulfills the need for one, and might fulfill the need for the second since one might presume that github backs up its own content. (One should however verify the second.)
In general from a professional point of view I wouldn't suggest relying only on a single business for a technical solution because businesses can and do run into trouble. But often it is sufficient to have ones content locally and then on an external source. However for a business (more that a couple of people) that probably isn't sufficient since there is data which is unlikely to be preserved on individual developer machines. That might be different when talking about a single individual however.
|
|
|
|
|
Why questions and discussions on these topics will be prevented in this forum?
Why not allow an open discussion about it also in the very details in this forum?
Why should we leave it to the underground?
My point is, the more I know about it the better I can protect myself.
Bruno
[Edit]
After 1.5h: I think all the so-called professionals do not know much about it and would like to wipe it comes under the carpet.
[/Edit]
modified 19-Jan-21 21:04pm.
|
|
|
|
|
You could always start a discussion.
|
|
|
|
|
If you are hinting about something like this:
A person asks how to create a key logger. This person is then criticised for asking how to create something that could be used to take information from a third party without that third party's awareness.
My reasoning as to why this criticism is valid is:
Most of us with a number of years behind us -
(1) Could quite easily create key logging software.
(2) Have a number of years behind us precisely because we have not created key logging software - we would soon be out of a job and probably worse if we created key logging software.
(3) Don't relish the thought of someone relatively new, to the world of software development, using our experience to create something that is ethically wrong.
So to those people wanting help in creating key logging, or any other 'dual use', software my message is:
If you want to create key logging software go and do the research yourself, don't ask people who have no desire to help you in your potentially unethical enterprise and expect them not to be critical of your request.
[edit] I spotted a grammatical error in my post, horror of horrors!
“That which can be asserted without evidence, can be dismissed without evidence.”
― Christopher Hitchens
modified 22-Feb-15 8:39am.
|
|
|
|
|
Good, good... It seems my keylogger is working.
You just typed:GuyThiebaut wrote: If you are hinting about something like this:
A person asks how to create a key logger. This person is then criticised for asking how to create something that could be used to take information from a third party without that third party's awareness.
My reasoning as to why this criticism is valid is:
Most of us with a number of years behind us -
(1) Could quite easily create key logging software.
(2) Have a number of years behind us precisely because we have not created key logging software - we would soon be out of a job and probably worse if we created key logging software.
(3) Don't relish the thought of someone relatively, new to the world of software development, using our experience to create something that is ethically wrong.
So to those people wanting help in creating key logging, or any other 'dual use', software my message is:
If you want to create key logging software go and do the research yourself, don't ask people who have no desire to help you in your potentially unethical enterprise and expect them not to be critical of your request. To make it go away deposit $1000 on my Swiss bank account
My blog[ ^]
public class SanderRossel : Lazy<Person>
{
public void DoWork()
{
throw new NotSupportedException();
}
}
|
|
|
|
|
I'll need your details first...
Bad command or file name. Bad, bad command! Sit! Stay! Staaaay...
|
|
|
|
|
Sander Rossel wrote: To make it go away deposit $1000 on my Swiss bank account No probs I will just claim the 1 squillion dollars I won last week, in the Nigerian lottery, and use that to pay your small amount.
I just need to find the email... now where is it... there it is... now to click on the link... here goes...
“That which can be asserted without evidence, can be dismissed without evidence.”
― Christopher Hitchens
|
|
|
|
|
GuyThiebaut wrote: 1 squillion dollars ... in the Nigerian lottery The exchange rate isn't exactly favourable, so 1 squillion Nigerian naira actually translates to about $1000
Also, the mandatory Dilbert[^]
My blog[ ^]
public class SanderRossel : Lazy<Person>
{
public void DoWork()
{
throw new NotSupportedException();
}
}
|
|
|
|
|
I understand your mind, but again, it is better to know what mischief is driven to protect themselves from. And the more of the mischief is published the less dangerous it becomes....I think.
Thank you for your comment
Bruno
modified 19-Jan-21 21:04pm.
|
|
|
|
|
You may well be beyond reproach with the reasons you want the code or the information.
However as the site is open to all, not all people may be as ethical as you and anything that slows these sorts of people down is a good thing.
“That which can be asserted without evidence, can be dismissed without evidence.”
― Christopher Hitchens
|
|
|
|
|
|
Bruno Sprecher wrote: it is better to know what mischief is driven to protect themselves from
Yes - however the only way one learns that is by actively pursuing it. Thus although you might not pursue it you wouldn't learn anything unless you were reading posts by those that were doing it.
|
|
|
|
|
I agree, I'd like to see some articles on virusses and worms. How the hell do they make that stuff and why can't I simply remove them? I had a virus once that made me re-install my entire computer!
I'm not at all interested in ruining other peoples day (or even days, and if stuff like that happens on a work computer, well... best have some backups!), but just out of curiosity I'd like to know.
That said, when CP teaches people how to create stuff like that it may hurt CP's good name. Because there are people out there who will use such knowledge for baaaad stuff. And if the next person who hacks into the White House claims he "got some script off CP" CP may even be considered a dangerous website by governments and may be banned (worst case scenario, of course). In any case, lawsuits are likely to follow.
Now DEFENSE against the dark arts, that would be completely legal
And here is one defense tip: Don't use Norton, piece of #@$@&^*%) is worse than the malware it protects you from
My blog[ ^]
public class SanderRossel : Lazy<Person>
{
public void DoWork()
{
throw new NotSupportedException();
}
}
|
|
|
|
|
Quote: That said, when CP teaches people how to create...
No, CP does not teach how to do it CP would teach how to recognize. The more this stuff is open the more one can recognize and defend.
Thank you for your comment
Bruno
modified 19-Jan-21 21:04pm.
|
|
|
|
|
Bruno Sprecher wrote: CP would teach how to recognize Unfortunately, you can't recognise malicious code unless you know how to write it.
The 'signature' that malicious code leaves is by its very nature the code, or the calls the code makes, itself, if only code had a smell we could train dogs to sniff out malicious code.
“That which can be asserted without evidence, can be dismissed without evidence.”
― Christopher Hitchens
|
|
|
|
|
If your functions or variables have the word 'scam' or 'MUWHAHAHA' anywhere in the name it's a pretty good indication that the code is actually malicious.
Also, if after debugging your code you've lost some thousands of dollars on your bank account you may be dealing with malicious code.
My blog[ ^]
public class SanderRossel : Lazy<Person>
{
public void DoWork()
{
throw new NotSupportedException();
}
}
|
|
|
|
|
Please adjust the Quote and stay fair!
modified 19-Jan-21 21:04pm.
|
|
|
|
|
Bruno Sprecher wrote: Please adjust the Quote and stay fair! Okay sorry about that, here goes:Bruno Sprecher did not write: Plz give me codez to take over the world, mwahahahaha!
“That which can be asserted without evidence, can be dismissed without evidence.”
― Christopher Hitchens
modified 22-Feb-15 9:14am.
|
|
|
|
|
You are not worth it, writing manipulated quotes is "is bottom of the Barrel!
modified 19-Jan-21 21:04pm.
|
|
|
|
|
It is highly problematic - it's like teach a dog to smell drugs. You have to feed the dog with drugs...
Skipper: We'll fix it.
Alex: Fix it? How you gonna fix this?
Skipper: Grit, spit and a whole lotta duct tape.
|
|
|
|
|
I only run Widows Defender on my Windows 8 machine and it works - sort of. But it does not provide 100% protection. For complete protection I take an Acronis image of my systems drive about once a month. This means that I can always restore my system to what it was at a prior date. Acronis has saved my bacon on a number of occasions and helped prevent a complete system re-build. What is more: You can get a free Western Digital Acronis version from the WD website, but this version only works if it sees a WD drive attached to the machine.
|
|
|
|
|
Windows Defender does the job for me too.
Luckily I've never had to do a system rebuild, save for that one time (which is well over ten years ago, it was an MSN thing I believe).
The only thing I'd really hate losing is my digitalized music collection. I listen to a lot of underground music that's not available on Spotify etc. so I keep a lot on my PC and iPod. I've got that backed up on an external HD though together with some photo's etc.
Other than that I'm not much into backups. There's worse stuff than losing my files.
My blog[ ^]
public class SanderRossel : Lazy<Person>
{
public void DoWork()
{
throw new NotSupportedException();
}
}
|
|
|
|
|
Quote: Luckily I've never had to do a system rebuild
Quickly: Knock on wood!
|
|
|
|
|
A friend of mine once told a teacher his computer crashed (which it had not), so he lost his assignment that was due for that day (Dutch class). The teacher was understanding and gave him an extra day to finish his assignment. When my friend came home his computer actually crashed! The next day he told the teacher the truth, that he lied, but that it kind of backfired. I believe the teacher could laugh about it, but still gave my friend a point deduction from his final grade
That was about ten years ago... I don't think my friend ever lied again. Fun fact, he and I have the same first name, we are still good friends and he is one of the best IT people I know
My blog[ ^]
public class SanderRossel : Lazy<Person>
{
public void DoWork()
{
throw new NotSupportedException();
}
}
|
|
|
|
|
I have to agree with Guy: this is a site for professionals, and there are things professionals don't want to do, or be associated with. There are plenty of sites for hackers, script kiddies, and related idiots - if this site became known for that kind of material, it wouldn't get through Corporate Net Policies that easily and could quickly become unavailable to the people that it wants to attract. Heck, do you want your company to blacklist CP?
And I'm not happy that my expertise would be used to create something malicious, either.
Bad command or file name. Bad, bad command! Sit! Stay! Staaaay...
|
|
|
|