interpreting the silence.

being a lip reader has always been a very big myth about the cia.
the first thing that you are supposed to do is to pay attention at when you sneeze it means that you asserted as a foxhound, the other is that when your head is itchy remember to scratch it so you have the signal that you thought wisely, the other is the sound of silence it is the sound of like a little bee that is constant and is the metaphor of understanding that it comes from one ear and it gets through the other, that is the metaphor of only one mouth and two ears is it not a signal enough for what is to hear more than speak, it is the sound of a deaf tone, if you see like a little dot that appears on the movie it means that you hit it straight.

the pulse of specimen in the head of the penis is mandatory to understand that in that case that sign means like stop harassing me.

have a nice day.

salutes and braille system for everybody.

to have the manual of braille system you should write the following in a piece of paper. you put the following command so you can read it with your fingerprints the command is this one:

. . .
: . . .

that code is in braille system but remember you must read it according to the back of the scripture in a piece of paper, try to do it with a needle and a sheet of paper so you can feel on the back the message, that is really important in computer hacking for manuals like what is actually like to clone credit cards and you see the number five in the atm. more information in a new post by the way.

salutes to everybody.

i just wanted to say hi, i would like to know many hackers of this website, my knowledge of computers is minimal acording to many people however it is common sense what is the graphic interface and even the command prompt, i have not understood already what is linux, however if somebody can asess me i would appreciate.

i also know what is a brute force attack dictionary.

the rest is for newbies.

have a nice day.

I'ma be deadass

My name(/nick/whatever the hell you wanna call it) sounds like a child name so I might be changing it soon and i'll let the ones i talk to know what its gonna be.

[NIX Programming] Part 1: Knowing the Roots.

[History and Overview]
It's important to keep an open mind when it comes to going back to the roots because understanding them is something that can help unlock a barrier long forgotten that is important in the way things work. Now everything that's fundamental about computer came from a system once known as UNIX, UNIX was an incredibly powerful operating system that was dated back in the late 20th century, only that as it grew it went from being free into something that was sold onto corporations for big money. Over time Bill Gates used UNIX to create the very first form of windows written in C. 2 years after the release of Windows in 1983 C became C++. Gradually over time Windows evolved and Microsoft wanted to remove UNIX from the equation in an effort to become independent, and they did as such by ripping away everything good that UNIX brought for the sake of making their own proprietary versions of it through MS-DOS. The other computer company at the time, Apple, chose to file a lawsuit over their grand scheme of things involving the software for the Lisa project, for imitating all the new qualities they had to offer, but Steve Jobs was in it for the loss in this lawsuit as by the time Windows was improved they had already removed all the things that made Lisa what it was.


Is the IRC down or is my shit just wack asf


I need some money who can help me


tolong ajarkan saya bagaimana agar bisa mendapatkan uang dengat cepat

[NETENG] Python TCP Programming

All scripts I write for this are found from the latest edition of Foundations of Python Networking by Brandon Rhodes which you can buy here:

The almighty Transfer Control Protocol or TCP as we all know it to be can be seen as a demigod for network protocols encompassing most of the internet in its grasp. To the way TCP works, you have to consider the way the three-way handshake happens SYN - SYN/ACK - ACK for beginning the connection, and FIN - FIN/ACK - ACK. If you don't already know about it consider looking up information about it. I went ahead and looked for a really good tutorial on YouTube which you can check out here

Anyway, the simplest thing to look at is a code for simply making a TCP client and server scenario...however with an added twist explained later on:

#!/usr/bin/env python3
import argparse, socket

def recvall(sock, length):
    #define empty data buffer
    data = b''
    #while the data buffer isnt the size of the incoming data
    while len(data) < length:
        #receive the (length - len(data)) bytes
        more = sock.recv(length - len(data))
        #if the server/client receives nothing
        if not more:
            #raise EOF error
            raise EOFError('was expecting {0} bytes but only received {1} bytes before the socket closed'.format(length, len(data)))
        data += more
    return data

def server(interface, port):
    #create socket with the reuse option for server
    sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
    sock.setsockopt(socket.SOL_SOCKET, socket.SO_REUSEADDR, 1)
    sock.bind((interface, port))
    print('Listening at', sock.getsockname())
    while True:
        #accept the incoming socket
        print('Waiting to accept a new connection')
        sc, sockname = sock.accept()

[NETENG] Python UDP Programming

All scripts I write for this are found from the latest edition of Foundations of Python Networking by Brandon Rhodes which you can buy here:

Contrasting the two biggest fields in IT to me is essential, like the concept of yin and yang, the two cannot coexist without the other. The two fields I am talking about are Network Engineering and Cybersecurity; I feel that it is essential to have an understanding of both as opposed to just one because the more you understand about one the more control you have over a network. Network Engineering is about solving problems...well through the use of engineering. Essentially what you are doing is solving problems within a network or making things easier through automation, plain and simple, using programming languages to do so. So to start this topic off I'll give an overview by introducing network programming with python.

To start off, we all know UDP is a non connection oriented protocol that sends out packets in the form of datagrams. Working with the protocol can be a tricky because in the world of cybersecurity clients using the protocol can be seen as promiscuous simply because often times the programmer may forget to check who the sender of the packet they just received is. Here's an example of a dangerous client:

import argparse, socket
from datetime import datetime

def server(port):
        server = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
        print('Listening at {}'.format(server.getsockname()))
        while True:
                data, address = server.recvfrom(1024)
                text = data.decode('ascii')
                print('Client says {}'.format(text))
                text = 'Your data was {} bytes long'.format(len(data))
                data = text.encode('ascii')
                server.sendto(data, address)

def client(port):
        client = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)

Syndicate content