How to hack a password for imgsrc

Your Open Hacker Community

2012.09.03 16:05 Fluffow Your Open Hacker Community

Welcome! This is your open hacker community designed to help you on the journey from neophyte to veteran in the world of underground skillsets. Ask, Answer, Learn. Visit us on discord https://discord.gg/ep2uKUG
[link]


2016.05.18 20:39 O5-8 >Run 9_year_old.exe

This is were you put those kids that can ddos you because you logged into the hacked code on javascript youtube c++ servers.
[link]


2012.02.17 20:36 callmesuspect PS Vita hacks and homebrew

🚨 This subreddit is marked as NSFW to stop ad revenue in protest of Reddit killing third party apps. 🚨 👉 See: https://redd.it/148m42t
[link]


2024.06.10 03:24 xbobxthomasx Account banned after getting hacked

I stopped playing league for years, and earlier this year decided to try and get back into it with friends, had to reset password, and then get a notification that I had been banned. I made a ticket and they said they're sorry yada yada how horrible... but then said the ban was not wrongfully placed. But my account had only been on NA, and I had been supposedly botting on EU, and they closed out my ticket saying they cannot do anything more. Is there any tips or advice on how to go about this? I feel it would be a simple check on their end to see IP last placed or differing from my normal login or just account logged in from different location, password changed, and then beginning to bot? I feel there would be easy checks but they chose not to out of ease, and my account goes back to nearing alpha/beta of league, just gone due to inactivity then getting hacked and banned...
submitted by xbobxthomasx to riotgames [link] [comments]


2024.06.10 01:40 Ok_Dragonfly6000 I beg you can someone help

I got a Trojan virus a few days ago for the first time in my life. I was unexpirienced and changed my steam password out of fear before i did full pc reset. Now since my pc i clean i tried to install steam again but i couldnt log in.I tried to change password again and let steam support know that iva been hacked and they told me that i succesfully changed it.I tried to log in and i COULDNT AGAIN..Now im told that i tried way too many times and that i should try again later.They didnt get my mail password with the virus since its secured with my phone and im the only person in the world that has access to it, shouldnt i be able to get my damn account back then already?If anyone knows how to help me i beg you ive been fighting off this damned hacker for many passwords these past few days nonstop....
submitted by Ok_Dragonfly6000 to techsupport [link] [comments]


2024.06.10 01:37 Ok_Dragonfly6000 Please people i beg you can someone help me

I got a Trojan virus a few days ago for the first time in my life. I was unexpirienced and changed my steam password out of fear before i did full pc reset. Now since my pc i clean i tried to install steam again but i couldnt log in.I tried to change password again and let steam support know that iva been hacked and they told me that i succesfully changed it.I tried to log in and i COULDNT AGAIN..Now im told that i tried way too many times and that i should try again later.They didnt get my mail password with the virus since its secured with my phone and im the only person in the world that has access to it, shouldnt i be able to get my damn account back then already?If anyone knows how to help me i beg you ive been fighting off this damned hacker for many passwords these past few days nonstop.... A
submitted by Ok_Dragonfly6000 to steamsupport [link] [comments]


2024.06.10 00:24 smartybrome Udemy Free Courses for 10 June 2024

Udemy Free Courses for 10 June 2024

Note : Coupons might expire anytime, so enroll as soon as possible to get the courses for FREE.
GET MORE FREE ONLINE COURSES WITH CERTIFICATE – CLICK HERE
submitted by smartybrome to udemyfreebies [link] [comments]


2024.06.10 00:24 smartybrome Udemy Free Courses for 10 June 2024

Udemy Free Courses for 10 June 2024

Note : Coupons might expire anytime, so enroll as soon as possible to get the courses for FREE.
GET MORE FREE ONLINE COURSES WITH CERTIFICATE – CLICK HERE
submitted by smartybrome to udemyfreeebies [link] [comments]


2024.06.09 17:33 HumbleFrench2000 Urgent Help Needed: Facebook Account Hacked, 2FA Activated by Hacker, Locked Out

Hello Reddit community,
I’m in urgent need of help with my compromised Facebook account. Here are the details:
What Happened:
• My Facebook account was hacked, and the hacker activated two-factor authentication (2FA) without my permission. • They have locked me out of my account, and I’m unable to regain access despite multiple attempts. • The hacker is also blocking the Facebook verification codes, repeatedly sending the same invalid code. 
Details:
• Hacker’s Alias: 张林子 (Zhang Lin Zi) • Hacker’s Device: iPhone Pro Max 12 • IP Address of Hacker: 14.232.52.31 (traced to Vietnam, possibly using a VPN) • Possible Locations: Mainland China 
Steps I’ve Taken:
1. tried to Secured My Email: • Changed my email password. • Enabled 2FA on my email account. • Checked recent activity and removed any suspicious sessions. (Unsuccessful) 2. Attempted to Contact Facebook Support: • Filled out Facebook’s “Hacked Accounts” form. • Sent detailed emails to Facebook support. • Asked a trusted friend to report my account on Facebook. 3. Sought Help Online: • Used services like Have I Been Pwned and SpyCloud to check for breaches. • Investigated the hacker’s IP and device details. 
Current Situation:
• I’m completely locked out of my Facebook account. • No response from Facebook support yet. • I’m receiving multiple verification codes, but all are invalid. • I’m concerned about the misuse of my account by the hacker. 
What I Need:
• Any advice on how to regain access to my Facebook account. • Tips on how to expedite a response from Facebook support. • Any additional steps I can take to secure my accounts and prevent further breaches. • Recommendations for cybersecurity experts or services that can assist. 
Help please
submitted by HumbleFrench2000 to facebook [link] [comments]


2024.06.09 02:26 marseli80 Sam’s Club weird account hacks — Insider involvement?!

I manage Sam’s Club accounts on behalf of my customers for their e-commerce account purchasing needs. All usernames, email addresses and passwords have never been shared or compromised. 2-step verification is enabled on both Sam’s Club login and Gmail email address. Passwords are changed regularly.
In the last few weeks, some of our accounts have been hacked. Two types of scenarios:
In a couple of cases someone called Sam’s Club and WITHOUT verifying their identity Sam’s Club changed the email address and phone number on the account to whatever the caller gave them. This gave them access to the account since they were able to reset the password.
For the other two, we just received an automated email notification on the original email address that the email address on Sam’s Club was updated (new email address not provided). When the account holder called Sam’s, they were told no one called in to make the change but they did provide the email address and password it was changed to. The account holder did NOT receive any OTP over the phone or email either! Which means that the changes were made on the Sam’s Club systems directly!
In all scenarios the hackers didn’t order new inventory by using the saved credit card information. They “refunded” the old orders and asked for a replacement in the same quantity but shipped to addresses of their choosing. We have those shipping addresses and names and phone numbers.
This is madness! How in the world is Sam’s allowing the account information to be changed WITHOUT any verification upon calling?!?!?! Also how is the information being changed without even calling AND without any OTPs when 2-factor authentication was in place?! This makes me think that some of these hackers have some form of help from inside Sam’s Club! Presumably off shore support people getting paid by these hackers or even US based support! I’m not trying to make up any conspiracy theories but this is beyond weird and totally unacceptable! I emailed Sam’s support and no answer!
What are people’s thoughts? Plz don’t attack the messenger - genuine answers and suggestions only.
submitted by marseli80 to samsclub [link] [comments]


2024.06.09 01:07 EdoGtz Pokemon disappear from my account and show up as never registered before.. ?.

Hello!. Yesterday (june 7) a few pokemon disappear from my account, and they show up now as if i've never registered them before. This is the second time this happen to me.
The first time (several months ago) i asked here about it and people told me that i was somehow hacked. I contacted niantic in the app but the bot didn't help at all... so i give up, accepted the lose, change my password asap as recomended and just keep playing normally without any problem, planning to get the shinies back from my friends (that's how we trash extra shines here after all). Back then the missing pokemon that i could easily notice were mostly shinies.. and i did notice them 'cause some of them were from CD that i already play in the past.. b.e all my shiny gastly and my shiny gengar disappear (i didnt have single one of the family shinies in my account). When i play a CD i always bother to get the special move in at least one regular and one shiny of each CD pokemon... the thing was that when i tried to get a shiny gastly from my friends via trade later (i select a comun/trash pokemon and they the shiny).. the game asked me to pay for it as if it was a new register.
Yesterday this happened again. I was able to notice it 'cause i lvl up and use my megas practically daily, i use a tag where i can see all my megas available in a list... so i notice that 2 of them disappear from my account ... my kangaskhan and glalies with mega already unlocked... that were favourite pokemons (that couldn't be transfered by mistake).. and also both megas doesn't show up as registered in the mega dex now (and i've registered every single mega available in the game). No other mega disappear (and i have shiny groudon, kyogre, rayray, etc)
This is a bug right?... if you delete a pokemon it should still appear as registered in the dex?. How it's possible that pokemon disappear from my account and the game ask me to pay for them as new register if i want to get them from my friends via trade?.
Sorry for my poor english.
submitted by EdoGtz to TheSilphRoad [link] [comments]


2024.06.09 00:37 interfn Smarkets account hacked

I wanted to see if anyone ever had their smarkets account hacked?
I started MB under a month ago with Oddsmonkey and paid for their annual subscription. I got up to ÂŁ153 profit and before the time of the hack, I had ÂŁ322 in smarkets and ÂŁ122 in my bank account. Obviously, looking back now I shouldn't have had that much in smarkets but didn't think much of it as I saw comments saying how people would leave their profits and extra cash to cover liquidity in their smarkets account.
Woke up this morning to see a lay bet was placed on some obscure football match on America at half 5 in the morning and I lost ÂŁ322.
On top of that, I had over 500 emails in my junk folder all asking me to confirm that I want to subscribe to a newsletter, all from different websites. These emails all came around the same time the lay bet was made.
Unfortunately, I didn't have 2FA authenticator enabled on smarkets but I don't get how my account was so easily hacked when Ive only been active for under a month and the password I used was literally for smarkets account and nothing else.
Have contacted smarkets and now got to wait for dew days until they get back to me.
submitted by interfn to MatchedBettingUK [link] [comments]


2024.06.08 22:25 contombug Can any one help, my account has been hacked

My account got hacked last week and I had no luck getting in touch with trading 212 at all. I want to start off by saying how badly run the company must be. For the last week I have sent over 6 emails, filled out the online form god knows how many times, I even tried dm’ing them on Instagram but I still haven’t had a reply.
So the story is I got a notification on my phone saying a share sale had gone through. I hadnt authorised this so I clicked on my app and I was logged out. I tried logging in but it kept saying wrong password. I tried doing the forgot my password button 3 times but never got the email. This was on the Friday. I tried getting in touch with trading 212 but had no reply. I kept getting notifications from my app as if I was logged in. The hacker kept doing a live chat. I could see everything the live chat person was replying to him just couldn’t see what he was saying (ive got screenshots of all the messages). Come Monday at 8 o’clock I kept getting notifications after notification of all my shares being sold. My worst fear had come true and he was cleaning me out. He started withdrawing my money. He hit a monthly withdrawal limit. He set up a couple more live chats trying to take this down but I think he had no luck. Through this time I had sent more emails and done more forms online but still no answer. The hacker had my email and then started to email me. He was pretending to be trading 212 and was saying to sort out my problem I needed to do a verification. He had my phone number and kept sending me a link. I didn’t do the link. He has spammed the hell out of my email wanting me to do the variation or send him a video with my i.d.
I stupidly didn’t freeze my bank card because I didn’t think he could access it but I was very wrong. He set up a recurring deposit. Friday morning £1000 came out of my bank account. As soon as I saw that I wanted to cry. I rang my bank and explained everything that has been going on. They have put a stop on all money going from my bank to trading 212 by putti a gambling stop on my account. They are investigating the £1000 so hopefully I’ll get that back.
I tried calling the number but the machine just says they aren’t taking phone calls at the minute and to fill out a form or email. This is really starting to get me down and I’m worried im gonna lose that money for ever. I didn’t have the 2 verification on as I got a new phone last month and I had to turn it off when setting up my new phone. I stupidly never redid it and what a fool I am.
Can any one help me or point me in the right direction. Any help will be very appreciated
submitted by contombug to trading212 [link] [comments]


2024.06.08 21:51 DisciplineNo1000 IPTV Security: How to Protect Your Streaming Experience

Introduction

In today's digital age, IPTV (Internet Protocol Television) has revolutionized how we consume media. With the ability to stream live TV and on-demand content over the internet, IPTV has gained immense popularity among users worldwide. However, with great convenience comes the necessity for robust security measures. Ensuring your IPTV experience is secure is crucial to protecting your personal information and maintaining a seamless streaming experience.

What is IPTV?

IPTV stands for Internet Protocol Television. Unlike traditional television, which relies on cable or satellite signals, IPTV uses the internet to deliver television content. This method allows users to stream live TV channels and on-demand videos through various devices such as smart TVs, smartphones, tablets, and computers.
IPTV works by transmitting data in small packets over the internet, which are then reassembled at the user's end to display the content. This process enables high-quality streaming and interactive features, making IPTV a preferred choice for many.

Why IPTV Security is Important

With the increasing adoption of IPTV, the risks associated with its use have also risen. Unsecure IPTV services can expose users to various threats, including malware infections, unauthorized access, and data breaches. These security issues can lead to severe consequences such as identity theft, financial loss, and compromised personal information.

Common IPTV Security Threats

Malware and Viruses

Malware and viruses are malicious software designed to infiltrate and damage your devices. When using unsecure IPTV services, you might inadvertently download malware that can steal your personal information or disrupt your streaming experience.

Phishing Attacks

Phishing attacks involve deceptive tactics to trick users into revealing sensitive information, such as login credentials or financial details. Cybercriminals often use fake IPTV service emails or websites to lure unsuspecting users.

Unauthorized Access

Unauthorized access occurs when hackers gain entry to your IPTV account without permission. This can result in unauthorized purchases, changes to your subscription plan, or access to your personal information.

Understanding IPTV Security Basics

Importance of Secure Connections

Using secure connections is fundamental to IPTV security. Ensure that the IPTV service provider uses HTTPS (HyperText Transfer Protocol Secure) to encrypt data transmitted between your device and their servers. This encryption prevents unauthorized parties from intercepting your data.

Role of Encryption in IPTV Security

Encryption converts data into a coded format that can only be deciphered by authorized parties. IPTV services that utilize strong encryption protocols protect your streaming content and personal information from cyber threats.

Choosing a Secure IPTV Provider

Factors to Consider

When selecting an IPTV provider, prioritize those that emphasize security. Look for providers with a strong track record of protecting user data, using encryption, and offering secure payment methods. The best IPTV providers will have transparent privacy policies and customer support that can address security concerns promptly.

Red Flags to Watch Out For

Beware of IPTV providers that lack transparency, offer unusually low prices, or have poor customer reviews. These can be indicators of unreliable services that may compromise your security. An IPTV service with a suspiciously low price might cut corners on security measures, leaving your data vulnerable.

Using VPN for IPTV Security

Benefits of Using a VPN

A Virtual Private Network (VPN) enhances your IPTV security by encrypting your internet connection and masking your IP address. This makes it difficult for hackers to track your online activities and access your data. VPNs provide an additional layer of privacy, ensuring that your streaming habits remain confidential.

How to Set Up a VPN with IPTV

Setting up a VPN with your IPTV service is straightforward. Choose a reputable VPN provider, install the VPN software on your device, and connect to a secure server. Once connected, you can safely stream IPTV content without worrying about your data being intercepted. This is especially useful when using popular IPTV services like IPTV Smarters Pro, which may require additional security measures.

Secure IPTV Apps and Devices

Recommended Secure IPTV Apps

Opt for IPTV apps known for their security features. Apps like Kodi, VLC Media Player, and Plex offer robust security options and regular updates to protect your streaming experience. These apps, combined with a reliable IPTV service like IPTV Smarters Pro, can provide a secure and enjoyable viewing experience.

Importance of Using Updated Devices

Using outdated devices can expose you to security vulnerabilities. Ensure your streaming devices, such as smart TVs and smartphones, are updated with the latest software to mitigate risks. Regular updates often include security patches that protect against new threats.

Firewalls and Antivirus Software

How Firewalls Protect Your IPTV

Firewalls act as barriers between your device and potential threats. By monitoring incoming and outgoing network traffic, firewalls can block suspicious activities and unauthorized access to your IPTV service. Configuring a firewall on your home network adds an extra layer of protection, especially when streaming content via IPTV.

Best Antivirus Software for IPTV Security

Investing in reliable antivirus software is essential. Programs like Norton, McAfee, and Bitdefender offer comprehensive protection against malware and other security threats, safeguarding your IPTV experience. Regular scans with antivirus software can detect and eliminate potential threats before they cause harm.

Safe Streaming Practices

Avoiding Suspicious Links and Downloads

Avoid clicking on unknown links or downloading files from untrusted sources. These can be potential vectors for malware that can compromise your IPTV security. Always download apps and updates from official sources to ensure they are free from malicious software.

Recognizing Secure Websites and Streams

Look for secure websites and streams by checking for HTTPS in the URL and verifying the site's legitimacy. Reputable IPTV services will typically have secure and professional-looking websites. If you're using a service like IPTV Smarters Pro, ensure that you only download the app from the official website or trusted app stores.

Regular Updates and Patches

Importance of Keeping Software Updated

Keeping your IPTV software updated is crucial for security. Software updates often include patches for known vulnerabilities that could be exploited by cybercriminals. Regular updates ensure that your IPTV service remains secure against the latest threats.

How to Enable Automatic Updates

Enable automatic updates on your devices to ensure you always have the latest security patches. This reduces the risk of missing important updates that protect your IPTV service. Most IPTV apps, including IPTV Smarters Pro, have options to enable automatic updates, making it easy to keep your software current.

Two-Factor Authentication

How Two-Factor Authentication Enhances Security

Two-factor authentication (2FA) adds an extra layer of security by requiring a second form of verification in addition to your password. This could be a code sent to your phone or an authentication app. Enabling 2FA on your IPTV account can significantly reduce the risk of unauthorized access.

Steps to Enable Two-Factor Authentication on IPTV Services

To enable 2FA, go to your IPTV service's account settings, find the security section, and follow the instructions to set up 2FA. This will significantly reduce the risk of unauthorized access. Services like IPTV Smarters Pro often offer easy-to-follow guides on enabling 2FA, enhancing your account's security.

Backup and Recovery Plans

Importance of Having Backups

Having backups ensures that you can recover your IPTV settings and preferences in case of a security breach. Regularly back up your data to a secure location. This practice can save you time and frustration if you need to restore your settings after a cyber attack.

How to Create a Recovery Plan for IPTV Data

Create a recovery plan by documenting your IPTV settings and keeping a secure copy of your login credentials. This will help you quickly restore your service if needed. Services like IPTV Smarters Pro often allow you to export and save your configuration settings, making recovery easier.

Monitoring Your IPTV Usage

Tools to Monitor IPTV Usage

Use monitoring tools to keep track of your IPTV usage. These tools can alert you to unusual activities that might indicate a security issue. Monitoring tools can help you detect unauthorized access or changes to your account settings.

Recognizing Unusual Activity

Be vigilant about any changes in your IPTV service, such as unexpected charges or unfamiliar content. These can be signs of unauthorized access or other security problems. Regularly reviewing your account activity can help you quickly identify and address potential security breaches.

Conclusion

Protecting your IPTV streaming experience involves a combination of secure practices, reliable software, and vigilant monitoring. By choosing a secure IPTV provider, using a VPN, keeping your devices updated, and following safe streaming practices, you can enjoy your favorite content without compromising your security. Remember to stay informed about the latest IPTV trends and use reputable services like IPTV Smarters Pro to enhance your streaming security.

FAQs

What is IPTV?

IPTV stands for Internet Protocol Television, a service that delivers TV content over the internet instead of traditional cable or satellite.

How can I secure my IPTV connection?

You can secure your IPTV connection by using a VPN, choosing a reputable provider, enabling two-factor authentication, and keeping your software updated.

Why should I use a VPN with IPTV?

A VPN encrypts your internet connection, making it difficult for hackers to intercept your data and providing additional privacy for your streaming activities.

What should I do if my IPTV service is hacked?

If your IPTV service is hacked, immediately change your passwords and contact your IPTV provider for assistance. Additionally, run antivirus scans on your devices to check for malware and consider using a VPN for added security.

How often should I update my IPTV software?

You should update your IPTV software as soon as new updates are available. Enable automatic updates can help ensure that your software is always up to date with the latest security patches. Regular updates are crucial to protect against new vulnerabilities and threats.

Exploring IPTV Trends

In the ever-evolving world of digital media, staying abreast of the latest IPTV trends is essential for both security and an enhanced viewing experience. Here are some key trends in the IPTV space:

IPTVTrends in Content Delivery

With the increasing demand for high-definition and ultra-high-definition content, IPTV providers are constantly innovating to deliver superior streaming quality. This trend includes the adoption of advanced compression technologies and more efficient streaming protocols to reduce buffering and enhance viewing quality.

Personalization and AI Integration

Another significant trend in IPTV is the integration of artificial intelligence to provide personalized content recommendations. By analyzing viewing habits, AI algorithms can suggest shows and movies that match the user’s preferences, making the viewing experience more engaging and tailored.

IPTV Trends Login Security

Login security is becoming a focal point in IPTV trends. Providers are implementing more robust authentication methods, such as two-factor authentication and biometric login options, to enhance user security. These measures help prevent unauthorized access and protect user data.

Best IPTV Services and Their Security Features

Choosing the best IPTV service is not just about the content offered but also about the security features. Providers like IPTV Smarters Pro are known for their comprehensive security measures. Here’s why:

IPTV Smarters Pro

IPTV Smarters Pro is one of the best IPTV apps available, offering a secure and user-friendly interface. It supports advanced encryption protocols to protect your data and offers regular updates to address security vulnerabilities. Additionally, IPTV Smarters Pro allows users to set up parental controls and restrict content, adding another layer of security.

IPTV Smarters Expert Tips

For those looking to maximize their security on IPTV Smarters Pro, here are some expert tips:

How IPTVTrends Affect Security Practices

As IPTV trends evolve, so do the security practices associated with them. The increasing sophistication of cyber threats means that IPTV providers and users must continuously adapt. Here are some ways IPTV trends impact security:

Enhanced Encryption Standards

With more IPTV providers adopting higher encryption standards, users can enjoy safer streaming experiences. This trend is driven by the need to protect against advanced hacking techniques and ensure that user data remains confidential.

Network Security Improvements

Advancements in network security, including the use of more secure protocols and better intrusion detection systems, are becoming standard in the best IPTV services. These improvements help safeguard against a wide range of cyber threats, from malware to phishing attacks.

IPTV Smarters Pro: Balancing Performance and Security

IPTV Smarters Pro stands out not just for its content delivery but also for its commitment to balancing performance and security. The app provides high-quality streaming while ensuring that robust security measures are in place. Users can enjoy a seamless viewing experience without compromising on their data security.

Importance of User Awareness and Education

Staying informed about the latest IPTV trends and security practices is crucial for users. Understanding the potential risks and knowing how to mitigate them can make a significant difference. Here are some educational tips for IPTV users:

Stay Updated with IPTV Trends

Regularly read articles and updates on IPTV trends to stay informed about new features, security enhancements, and potential threats. Knowledge is a powerful tool in maintaining your streaming security.

Participate in User Communities

Engage with IPTV user communities and forums. These platforms are great for sharing experiences, tips, and staying updated on the best IPTV practices. You can also learn from the security strategies implemented by other users.

Conclusion

Protecting your IPTV streaming experience involves a combination of secure practices, reliable software, and vigilant monitoring. By choosing a secure IPTV provider, using a VPN, keeping your devices updated, and following safe streaming practices, you can enjoy your favorite content without compromising your security. Remember to stay informed about the latest IPTV trends and use reputable services like IPTV Smarters Pro to enhance your streaming security.

FAQs

What is IPTV?

IPTV stands for Internet Protocol Television, a service that delivers TV content over the internet instead of traditional cable or satellite.

How can I secure my IPTV connection?

You can secure your IPTV connection by using a VPN, choosing a reputable provider, enabling two-factor authentication, and keeping your software updated.

Why should I use a VPN with IPTV?

A VPN encrypts your internet connection, making it difficult for hackers to intercept your data and providing additional privacy for your streaming activities.

What should I do if my IPTV service is hacked?

If your IPTV service is hacked, immediately change your passwords and contact your IPTV provider for assistance. Additionally, run antivirus scans on your devices to check for malware and consider using a VPN for added security.

How often should I update my IPTV software?

You should update your IPTV software as soon as new updates are available. Enabling automatic updates can help ensure that your software is always up to date with the latest security patches.
submitted by DisciplineNo1000 to u/DisciplineNo1000 [link] [comments]


2024.06.08 20:00 Infinite_Average_224 Have you ever had your parent accuse YOU of stalking? What did you do?

Recently, my mother has began to accuse me of stalking her. She is not doing it in an overt way, but it has really triggered me.
Has anyone else had their parents do this? From what I read, most people are stalked (like how my dad stalked me) and I couldn't find anyone else accused of it. HTo me it feels like a scary escalation, like no longer am I just a bad daughter or whatever, I'm actively stalking her in her narrative.
Backstory:
My dad stalked me throughout my childhood and adulthood, and he was a diagnosed narcissist who lost custody of me in middle school as well as got a restraining order against him.
My mother is not diagnosed with anything, but she was hospitalized for an attempt a few years ago and was very unstable the majority of my life. In therapy she acts normal and leaves out lots of key things like her hoarding or sleeping all day. In therapy, her issues become a slight temper or delaying chores--rather than true things like she has garbage up to the ceiling or yells at people at stoplights because they looked at her wrong.
As for why she believes I'm stalking her: in the past 2 years, she's began to get more and more codependent. This is definitely partially my fault for letting her, I have poor boundary issues because whenever I state one (i.e. don't come over daily) she melts down and gets prone to hospital visits. So I have let her just be around more and more, despite her getting a bit more intense the past few months.
Anyway, she believes I am stalking her because I helped her when she got hacked a few years ago and made her a chart of all her passwords/secret questions since she got so locked out of everything she missed filing taxes; didn't file an insurance claim because she couldn't even access any email; and didn't have an ability to play her Facebook games.
This sheet has been FINE, and I have helped her many times up until even last month when she lost them again--this sheet has been invaluable for her and me, and it does live in my house because she is a late stage hoarder and could not actually keep the sheet around. I also have never once logged in as her, not just because I'm a busy person with my own life, but also because I really don't need to see whatever I may find. When I was a teenager, she logged into my computer and cryptically quoted me for a month until I realized what she had done (talk to my friends, be on my MySpace, etc). Since I was like 16, I did the same to hes in retaliation after, and what I found deeply hurt me (it was a lot of screeds about how I am just like my dad in appearance, how she knows I will be homeless someday, and more).
However, yesterday she changed everything without saying a word and of course she remembers none of the new passwords... so....
I found out because she got logged out of something and had a meltdown when she was here to pick up some mail. The usual shutting her laptop, muttering, etc. Because she always comes over, she always plays a few games on her phone or laptop. However, this time she couldn't because she could not access her stuff. I went to get the sheet and she told me she had changed everything, and didn't need my help. I was confused because she was raging about passwords and being too blind due to cataracts to see her password, so I had clearly just wanted to help. Eventually, she asked for my help after declining it. But while it was ongoing, she treated me like I was trying to relearn her passwords she just changed (which I had no idea she had done) and made me count to 20 and look away while she tried it a few more times.
Finally, I just helped her reset. She didn't say thanks. And since my therapist has been saying to have more boundaries, I honestly told her this felt to me really degrading and unprovoked, and she basically told me to agree to disagree because I'm clearly reluctant to give up control of her life (she did this while screaming, btw, "WHY DO YOU ALWAYS DO THIS AHHHHHHHHH AGREE TO DISAGREE AHHHHH" etc).
I told her I can't do that since it does imply that there is a reality in which I truly stalk hehack her and otherwise watch her digital profiles. Or that I have any control of her life, which is absurd (I don't! I just helped her bills get on auto-pay 2 years ago and organize her pws after she got out of the hospital for an "attempt"!). I would be happy to agree to disagree on an issue that isn't basically saying there is a world in which I am stalking and hacking my own mother.
I asked her why she believes I do this, and she said she knows and I know I did.
She left in a rage when I told her I know I don't, and that I wouldn't let her say I did under my roof (she told me I was controlling for this).
The thing is, I know shortly she'll either have an "attempt" or just come back like nothing happened in the next 48-72 hours.
And my issue really is--she's NEVER gone here before. I've never been a "stalker" or "enemy" before. A bad daughter, sure. Greedy, sure. But this is new territory and my gut is screaming she's incredibly dangerous if she thinks I'm stalking her. It feels a bit scarier than before.
Has anyone been ACCUSED of being the stalker before? I know narcs usually stalk (my own dad did!), but I could not find anyone in the search who has been called the stalker.
submitted by Infinite_Average_224 to raisedbynarcissists [link] [comments]


2024.06.08 18:09 ridibulous My roommate stole my online information in attempt to extort me for sex.

I feel like I'm in a goddamn sitcom. I didn't know exactly where to post this, so if this isn't the right place, please direct me somewhere else. I just need fucking help. I've been spiralling mentally since yesterday.
For clarification, I'm in a group foster home, have been for a couple years, and am due to move to an adult group home soon. This is why I'm 19 and he's 16. Also, I'm in the USA, I just prefer 24 hour time.
I was out yesterday in my town at a pride event, absolutely not home at all and hell not even touching my phone. There's no way I clicked on suspicious links or my email being involved in a data breach or anything. Among other insane circumstantial evidence which I'll say eventually. I get a cashapp confirmation code out of nowhere at 18:52, which I just though, that's really weird, must be some bug I guess. After a street painting I participated in, I checked my phone around 19:30 and saw I was completely logged out of my main Google account. Eventually learned I was logged out of my Discord as well. I tried logging back into both, "password was changed less than an hour ago". After enough fighting, I managed to get back in momentarily, tried changing the password, it was changed almost immediately again, I was logged out again. Recovery phone number was changed, another email was added to my main account. I accidentally removed my recovery email out of panic trying to damage control. Two attempted charges to Supercell on my bank account. Discord information was entirely changed and I tried reaching out to support only to get Clyde (robot) in response.
I'm absolutely distraught already by this, but it really only sounded like some random dickhead trying to get my information for whatever reason. That was until I got an email on my professional gmail at 21:16. It was my roommate saying he "found out I was gay" and that he was exploring more and wanted me to "anal fuck" him. Among just... other really vile shit. To make this tragically funnier, I'm a transgender man. I don't have a penis like he thinks I do.
The email conversation continues for way too long, me unaware how pervase the situation is and trying to figure shit out, he reveals that he's intruded in my room, he knows how to unplug the cameras in the foster home, that he knows how to "hack my stuff back", that the renter of the house/foster parent (let's call him M) was home, which he was when I arrived. And sure enough when I came home as well, my secondary burner phone was moved. The battery was at 4% (it's always turned off at near full battery), and now has a grid passcode. I never gave it a passcode, which is an error on my part really, but still. I'm locked out of my emergency phone. And said phone only had 2 other apps besides my Google information (because Android), which was Discord and Spotify.
I kicked up shit about it, tried getting M to confront him, we got to see his phone screen. 2 things I managed to see as he was obviously trying to evade showing incriminating evidence. My main gmail, and the fact he was logged into at least 10+ gmail accounts. He kept deflecting, saying that he didn't know anything, the works. Refused to show which accounts he was logged into despite the stray click showing the plethora he was logged into. Denied knowing my main gmail account despite the fact I saw it autofill when he was composing emails. Which was the only way he was "proving" anything. Kicked up more shit, tried to get police involved because I'm fucking pissed off, they effectively told me to eat shit and go get tech support because "no crime was committed".
And as a cherry on top after the officer left, the Spotify account I tried to keep safe by changing my emails on other services, the email was changed to my now compromised main email and I was kicked out. Really fucking interesting.
So, I dunno. I'm at a fucking loss. I'm honestly being a Karen and complaining to damn near everyone in my life who'll listen and/or could do remotely anything about it. Because that google account has sensitive government + medical information of mine notably in my gmail inbox, among like... you know. Losing fucking everything. Losing my support system over Discord and all the information on there, too. Detectives aren't able to be contacted until the weekday. I've already texted my own social worker about it.
I'm half wishing I'm overreacting and this is just some huge bizarre coincidence. But if it is, all the information I'm seeing is extremely suspicious. And I'm scared. I honestly don't feel safe around him or in this house anymore. I'm going to get an outside lock for my door soon today and hopefully going to the tech store to get the grid passcode removed, where I'm gonna push M about the situation and its gravity.
I'm so fucking lost. I don't know what else I can do. I don't know how I'd do it, I've never had to deal with this before and feel like I'm shooting in the dark. I don't wanna lose all my information to some horny teenager trying to leverage me. And I sure as hell wasn't ever planning to risk becoming a sex offender at 19 over this. Please help.
submitted by ridibulous to legaladvice [link] [comments]


2024.06.08 15:00 AutoModerator Bi-Monthly Questions Thread & FAQ

This weekly thread is designed to be a place for all the new members of the subreddit and Vita community to come and say hello as well as where they (or vets) can ask any question they might have (no matter how redundant or simple). So, say "Hi", ask away, and welcome to /Vita!

FAQ

We get these questions a lot, so we're incorporating them into this thread. Have something you feel fits here? Shoot us a modmail!
Is the Vita worth buying in (current year)?
Value is ultimately subjective. If you like the library of games on the Vita and have the money, probably. If you want new, modern games then probably not. If you have specific questions about the Vita's capabilities feel free to ask in this thread, but keep in mind you're asking in a Vita-centric community and will likely get mostly affirmative responses.
Is the PlayStation store shutting down?
No. Sony did announce they were closing the Vita storefront in 2021, but later reversed that decision. It is possible that the store will be shut down at some point in the future, but no specific dates/timeframes are known.
Can I still buy games from the PlayStation store?
Yes. However, you will need to have funds in your wallet for the purchase. You can add funds to your wallet via web, PS4, or PS5. More information is available here.
I'm having trouble signing into my Vita! Help!
As of the 3.74 update in May 2022, you need a device password to sign in to your Vita. You can do that here. Please make sure you are on firmware 3.74 and using a device password before making a thread.
My Vita is in an error loop with the QR code on sign-in. What should I do?
This happens sometimes, and nobody's really sure why. However, community member LoganN64 has been able to provide instructions that consistently work for getting through this:
  1. Log in to the PSN website with a Laptop or Desktop computer.
  2. Click on your avatar in the top right corner and go to SETTINGS.
  3. Scroll down to SECURITY and then scroll down to ACTIVATE/TURN ON 2 FACTOR AUTHENTICATION.
  4. Click on GENERATE NEW DEVICE CODE, write this down exactly as it is case sensitive.
  5. Go to your Vita and bring up the sign in page, enter the email associated with your account then enter the NEW DEVICE CODE as your password. Click on save password to avoid getting a new code each time..
I'm no longer able to transfer files from PS3 to Vita. What's happening?
This feature was disabled in May 2022. You can read PlayStation's update about it here. No workarounds are currently known.
Where can I buy a Vita?
Vita production ceased in 2019 so consoles can be hard to come by, especially new. eBay is the most prominent location, but Facebook marketplace, Kijiji, Craigslist, /GameSale, and equivalent marketplaces are your friend.
How much is (X) worth? Is (X) a good deal?
You can search sold eBay listings here to get a sense of value. VGPC is another source of this kind of information.
Will (Game) ever go on sale?
As of 2020, Sony has disabled developers' ability to put Vita games on sale. So in all likelihood, no.
The workaround and exception for this rule is that cross-buy games can still be put on sale for the PS4, and cross-buy items will still grant the Vita version (where applicable).
Should I buy an OLED ("Phat") or Slim Vita?
Neither are bad options. The Slim has 1GB of on-board memory, a more standard charging port, slightly better battery life, and is lighter. The Phat has a better screen. It's up to you on what you value more.
Where can I buy replacement Vita parts?
AliExpress and eBay are currently the best sources of Vita replacement parts.
Are Vita consoles region-free?
Yes. A Vita can play a physical game from any region. The digital storefront you can access is determined by the region of your PSN account, and not the region of the console. For example, a Vita from Japan will be able to play any physical game, and if you sign in with a US PSN account you'll be able to access the US PSN storefront.
Vita consoles from Asian regions have the X/O button swapped in the OS ("bubbles") screen, but in-game functionality retains X-to-confirm functionality for almost all games.
It has been reported that consoles intended for China have more stringent region-locking, but these are not commonly found and this is unlikely to affect you.
I'd like some game recommendations!
Check out our Wiki page, 2021 subreddit poll, and 2018 subreddit poll. If that isn't cutting it for you, feel free to ask in this thread or create your own thread on the subreddit. Keep in mind that we require 300+ characters for recommendation posts on the subreddit, so be sure to include plenty of detail about what you're looking for, what you've played, and so on.
I have a question about hacks/homebrew
Check out /VitaHacks - that's their specialty and they've got a pinned thread to help you out.
Curious about what else is coming up? Our full auto-post schedule is here.
submitted by AutoModerator to vita [link] [comments]


2024.06.08 12:25 Haunting-Village5217 Hacker threatning me

Hey im having a issue or a problem a hacker, hacked me a long time ago 2022 or smth now he has sent some demands. Upon this link https://www.reddit.com/cybersecurity_help/s/FHtNsQTS7g i have the same email that i recieved but its different first of all he is threatning me about me watching pornography and he also said my latest website visit was porn, overall he also has a video of me masturbating on the left side while on the right side of the video is the vid im watching and its a video compli, he said if i dont give him his demands of 1200$ via bitcoin he would release the video public and also on email and messaging apps now he specified the messaging app i was using so it is convincing that it might be real the messaging app was messenger and knows my messenger contacts and email contacts. He also said that he has access to everything my pc, my phone, etc, even if i change devices he is still there, overall is he really in my phone? Because this is a iphone also im scared that he might have access to my parents devices i hope not, he basically has access to camera, mic, etc and can listen and see me whenever he wants, he also sent this to multiple of my google accounts same message. Also if i share the message he would automatically send and share and make the video public, overall he has been logging in for so long since this hacker has been here since 2022 iv changed my passwords and such yet he hasnt stopped my outlook account is full of unsuccessful logins from him. I have deleted everything i have blocked my friends and such and have terminated my accounts because im scared if this is real then they will see it and contact me which is very embrassing indeed. I have lost everything mostly because of this message i need help is this true? It is very convincing since he told me that He knows the gmail and the messaging app i use. He also said that if i open the email he would recieve a notification and i only have 50 hours left 2+, he also said that it was a trojan virus which is undetectable and has infiltrate my system he said that his signature was refreshing 4 hours so the system cant detect it which makes it undetectable, iv resetted my device many times now i dont know how he is still here
I need a opinion if this is real or fake or a scam, he also has emailed me on my 3 google accounts.
submitted by Haunting-Village5217 to techsupport [link] [comments]


2024.06.08 10:49 clairOooToT WRONGFULLY BANNED

WRONGFULLY BANNED
so i got banned from royale high, stated that i hacked someone, this issue uas been going for a week now and lily was the developer tha replied to my email, i find it annoying how she said in the last email that said that my email doesn't have valid information and proofs for not being crosstrades, selling or hacking, i already explained it to her and gathered all my proofs, including the convo of me and my ex-friend who give me her stuff for free and then proceeds to change my password but luckily my roblox account was attached to my email, confronted my friend abt it and she blocked me without any further explanation, then 3 days after i got banned from hacking and she reported me, i did not go into her account and already explained it to lily in email, she take 2 to 3 days to reply, i cant help but to think that this auto ban system is so unfair, I've provided them the proofs i have and everything but still, it pisses me of smh that the last message i received was like a copy pasted, the fact that i already answered and cooperate to her so i can lift up the banned, 50 years for unsure reason to get banned is crazy bro... any advice and tips? literally crying my eyes out cuz i have completed all the sets there and a decent amount of diamonds and almost completed the gamepass...
submitted by clairOooToT to RoyaleHigh_Roblox [link] [comments]


2024.06.08 07:14 RoeddipusHex Can account access be reset without access to phone, email or other 2FA method?

My checking account was hacked. Chase allowed a password reset and ID thieves added phone, email and mailing address to my account then ordered a new debit card and ran up $15k in charges.
The web page lists a support phone number as an option for getting access to my account. I can't get a straight answer from Chase about what is required to get access to my account if "I" don't have access to my email or phone. It seems clear to me that someone at chase was socially engineered into granting access to my account and allowed this to happen. How can I prove it?
submitted by RoeddipusHex to Chase [link] [comments]


2024.06.08 03:36 pandorlax Circumventing Ubisoft - Outlook no email issue

Hey all. So am locked out of ubisoft.
I didn't lose my password, and wasn't hacked. Ubisoft just decided that my activity was suspicious, and required me to change my password. Problem is, my hotmail does not receive emails from ubisoft. I can't receive the 'password change' email or the 'change email' email.
What i've done:
- sent 3 case tickets. 2 from main email, 1 from alternate email.
- playstation account is still linked. (and i can log into ubisoft through it for daily updates) playstation account is on alternate email, but still can't request an email to alternate email.
-tried to set up email forwarding to my gmail, hoping that it might come into my gmail instead, but not working.
-tried to be extra with it, and set up my hotmail on a 3rd party carrier, and emails still don't come through. also tried a combination of forwarding and 3rd party. that didn't really work
- added all variations of @ ubi, @ ubisoft domains and individual emails to safe sender lists. (im not on exchange, so i can't adjust my SCL)
- been trying to request 'password change' email and 'email change' emails every 8 hours for last couple days. None of them are coming in. I also have email forwarding also set up for my gmail, just in case suddenly falls through the cracks.
-1 of my tickets changed to in progress after 3 days, and is now on day 3 of being in progress.
-reached out via X, FB, Discord, you know all the stops. And also asked this question, but haven't heard too much.
I know obvious answer is to wait the 2+ months. I just put down quite a bit for the game, season pass and some merch, and I obvi wouldn't want to wait that long. I also put too much work into my main account for a live service game, and i don't really want to restart anything on a separate account.
Does anybody have any ideas how to circumvent this microsoft BS ? I heard the wait is 2+ months, is that still current ?
submitted by pandorlax to ubisoft [link] [comments]


2024.06.08 02:38 Ur_Anemone How to Handle Online Harassment When It Happens to You

How to Handle Online Harassment When It Happens to You
If your inboxes, mentions, and DMs are blowing up with hateful comments, here are the technological and psychological tools you need to weather the storm
Document Everything
…Document everything. If you have to report the harassment to a social platform or to law enforcement, you will need a body of evidence that proves the harassment.
Save the nasty emails in a special folder, either manually or by using keywords to filter and route all of the relevant mail automatically.
On social media, screenshot what people say. Doing this gives you lasting digital proof, which is important if the trolling comments disappear later on, either because the trolls deleted them or because someone reported the comments, which led to them being removed. Save all of these screenshots in a folder that can easily be shared with anyone investigating your harassment.
Documenting harassment is common advice, featured in resources ranging from writing-specific organizations like PEN America to wider organizations like the University of Chicago and the National Network to End Domestic Violence.
Don’t Respond
Another common piece of advice is “don’t feed the trolls.” In theory, if you don’t react to harassment, the trolls get bored and leave. Some have argued that this advice has failed us, as it puts the onus on the victim to stop the cyberbullying; it suggests that it’s not the trolls who need to stop but rather the victim who needs to turn the other cheek.
This is a fair critique; social media platforms should build better moderation systems and restrict users who breach standards on harassment. Ideally, events like the 2024 child safety hearing before US Congress will lead to changes that make the internet safer for everyone. In a perfect world, the onus is on Big Tech.
But internet safety is a work in progress, and in the meantime it’s on us to decide how we want to respond…So I followed the American Psychological Association’s advice and let the storm pass. I logged off social media and routed the nasty emails into a special folder, out of sight. I spent my energy on things I enjoyed instead, no trolls involved.
Or Maybe Do Respond
Walking away isn’t the best option for everyone. If you choose to respond, there are both indirect and direct ways to address harassment. The former could include muting threads or blocking accounts. You could also report comments or users for behaviors that breach community standards, such as hate speech, threats, and bullying (which most platforms claim to prohibit). These options may prevent the same trolls from harassing you, or another user, in the future.
If you feel safe and want to respond directly, consider counterspeech, a strategy that addresses and undermines hate by redirecting the conversation in a constructive way...
Do Something You Enjoy
Whether or not you respond, give yourself time to work through your feelings. Do something you enjoy, like going to the gym, meditating, or playing your favorite video game…
Social support, in particular, is important for processing your experiences. This is because one of the goals of online harassment is to make you feel isolated; intentionally enjoying time with loved ones can combat this. An older 2014 study noted that social support can come from anyone in your life, ranging from your peers to your family. More recently, a 2020 study listed the myriad benefits of social support for those experiencing bullying, including increased confidence and decreased anxiety.
So text your friends and coworkers. Make dinner plans with family. Rant to your partner—or ask for a distraction. Any and all of these can help you feel less alone. You can also seek professional advice via a therapist or a cyberbullying hotline.
If you decide to take an extended break from the internet, ask a friend you trust to keep an eye on your social accounts. They can continue to take screenshots of new harassment and notify you if the frequency of incidents increases.
If the Harassment Escalates
If rude comments turn into stalking, hacking, doxing, or death threats, it’s time to contact the authorities and get legal assistance. Continue to document everything; you’ll want a body of proof to ensure you’re taken seriously. If you’re in immediate danger, call emergency services.
Practicing good cyber hygiene can help you protect your information. To deter hackers, use strong passwords, which are longer than 16 characters and include numbers and special characters. Don’t reuse passwords, and set up multifactor authentication to ensure that you’re notified if someone tries to log in to your account.
To deter doxing, stalking, and further harassment, adjust your privacy settings on social media. If possible, set your accounts to private until the storm passes…
You may want to limit who can see your location data on social media, since many platforms tag every post with geolocation data unless you opt out. This is usually something you can turn off in your profiles’ privacy settings. Additionally, browser extensions like Privacy Party can help you keep your privacy settings on social media up to date automatically, so you don't have to think about it.
If things get so bad that you feel it's safest to minimize or erase your digital footprint, paid services like Delete Me can remove identifying information like your address, phone number, and social media activity from hundreds of online databases and data brokers. This makes it much harder for people to uncover this information in web searches. Services like Tweet Delete can automatically delete years worth of social media posts, replies, and likes—either wholesale or within a specific range—from your accounts.
Online harassment can be isolating and terrifying, but with a plan, you’ll be prepared to respond—and to mitigate its impacts on your life.
submitted by Ur_Anemone to afterAWDTSG [link] [comments]


2024.06.08 00:46 Pumpkin-Spice13 Got Hacked by someone who is now Blackmailing You with a Ransom Note? Read This!

Subject: Google Extension Virus Hack (tTabs Extension, OOBLE Virus)
Hi everyone,
I recently went through a very harrowing and traumatic experience with an online hacker, and I understand how confusing and scary this can be. If this happened to you too, I want to help you as much as I can. Here’s what you need to know:

Important: Read This Message If This Happened to You

ATTENTION: Do not respond to or engage with the hacker. The blackmail they are sending you is a scam (even though the hack is real) and engaging with them is potentially dangerous. I also highly recommend not opening any file attachments they send you, as these could potentially contain other unwanted cyber threats.
If this happened to you, don't worry, you're not alone and everything is going to be okay. The person who did this to you is a terrible person and you probably feel very angry and emotional right now. What this person did to you is absolutely wrong and you have every right to feel the way that you do. Your anger and hatred towards this person are completely justified.

My Experience:

About 2 weeks ago, on May 23rd, this happened to me too. And, I'm here to help as much as I can. Let's put an end to this hack. But first, let's make sure you know what to do to remove this virus from your computer and make sure you know what to do to secure your accounts.

What is the OOBLE Virus?

I'm giving it a name because it needs one. I am calling it the OOBLE virus because these are the first 5 letters of the file name this virus was contained in on my computer.
Here's what it is: The virus you downloaded on your computer (aka the OOBLE Virus) is a Google Extension Virus. The good news is, Google Extension Viruses are easy to remove from your computer (as long as you follow a proper step-by-step guide on how to remove them). The bad news is, since it is a Google extension that scrapes all of your data from your Google browser (mainly login info like emails, usernames, and passwords), the person who hacked you now has access to all of this information about you. There is a very high chance that any Google account you've ever logged into on your computer is now compromised. This is what makes this virus feel so world-ending and like someone else is controlling your life. That's why the first thing you need to do is start changing all of your passwords from a secure device that is not infected.

Here's a Step-by-Step Guide on Exactly What to Do if You Have a Google Extension Virus:

Step 1: Secure Your Google Accounts (and any other logins like bank account logins that are stored in your Google account)
TURN OFF YOUR COMPUTER (or whatever your infected device is) and use something else (like your phone or iPad) to start securing your accounts and changing all your passwords. Remember, they can only retrieve data about you from your infected device.
Ask yourself, what have I logged into on my computer recently? Netflix? Hulu? Facebook? TikTok? YouTube? Bank Accounts? You need to change the password for everything you can think of. I know this can be very overwhelming, so if you can't think of everything, it's okay. Start with your most important accounts first. Definitely make sure you change your password for your Gmail accounts.
Step 2: Remove the Virus Manually from Your Computer
Go on YouTube and search for "Google Extension Virus." Several YouTube videos will pop up that explain what these viruses are and give you step-by-step instructions on how to remove these viruses from your computer. You have to do this yourself because they are installed in hidden folders on your computer that antivirus software can't see.
Basically, what you need to do for this is boot your computer into safe mode so you can open your computer registry and delete the virus manually. Mine was in my AppData folder and all I had to do to remove it was click on the correct folder containing the virus and then click delete. And just like that, the virus was gone.
Tracing the Virus to a Source Location:
You do not need to be in safe mode to do this. I actually don't even know if it's possible to do this in safe mode since you need the virus to be running in your browser to trace it.
To find where the virus is hiding on your computer, go to the extension (in this case, tTabs) and click "Details." From here, you should be able to see a very long file ID number. Something like ooblegaopweigeogiarnpoifdkglibgvnmwevoi (I can't remember the whole thing so I just mashed keys on my keyboard to create a similar file name).
Then open your File Explorer and go navigate to your Profile folders using this path: C:\Users\Your Name\AppData\Local\Google\Chrome\User Data\Profile
Under the folder "Profile 1" (this could also be Profile 2, Profile 16, Profile 27, etc.) you should see a folder with the same exact ID that matches the ID from the Google extension (here that ID is ooblegaopweigeogiarnpoifdkglibgvnmwevoi). This is the folder containing the virus that needs to be deleted from your computer's registry. When you are editing your registry, you will need to make sure you delete this folder under every single profile it is in (yes, it can be in multiple profiles at the same time).
If you don't know how to do this, you can go on YouTube and find a step-by-step guide on how to do this properly.
Step 3: Remove the Google Extension from Your Browser
You will need to do this for every single Google profile that is on your computer. I did this on my computer by logging into each account I have on Google Chrome one by one, clicking on the 3 dots in the top right corner, and going into my extensions settings. From there, you should be able to remove the extension the hacker installed on your computer.
You might be thinking, wait what? So, the way this virus works is that they install a program onto your computer that automatically installs a Google extension in your browser every time you log into a new Google account in Google Chrome. This is why you need to remove the virus from your registry before you do this part. Otherwise, the program they installed on your computer with the hack will just keep reinstalling the extension that scrapes your data into Google Chrome.
Helpful Info:
The Extension from the hack on my computer was called "tTabs." I will use tTabs as an example. If you need to remove tTabs (after you delete the virus from your registry) you can click on "Remove" under tTabs in your Google extensions settings.
Step 4: Recover Suspended Social Media Accounts
If your Facebook account was disabled there is an email address you can contact to request that they disable it and explain your situation. This happened to me and I have not heard back from them yet, but Facebook Support is so bad that I wanted to make sure to post this here in case anyone else needs this info.
Facebook Support Email for Disabled Profiles: disabled@fb.com: For help recovering disabled or hacked accounts, password resets, or page access issues

Immediate Steps to Take:

  1. Do Not Pay the Ransom:
    • Paying the ransom does not guarantee that you will regain access to your accounts, and it may encourage further malicious behavior.
  2. Run an Antivirus Scan:
    • Use reputable antivirus software to scan your computer and remove any detected threats. Ensure your antivirus software is up to date. I personally used Malwarebytes.
  3. Change Your Passwords:
    • Change passwords for all your online accounts, especially those that were compromised. Use strong, unique passwords for each account.
    • Consider using a password manager to generate and store secure passwords.
  4. Enable Two-Factor Authentication (2FA):
    • Enable FA on all accounts that support it. This adds an extra layer of security by requiring a second form of verification in addition to your password.
  5. Check for Unfamiliar Apps and Extensions:
    • Review the apps installed on your devices and the extensions in your web browsers. Remove any that you do not recognize or trust.

Contacting Support:

Securing Your Devices:

  1. Review App Permissions:
    • Go to your device settings and review the permissions granted to each app. Revoke any unnecessary permissions.
  2. Backup Important Data:
    • Regularly back up important data to a secure location, such as an external hard drive or a trusted cloud service.
  3. Update Software:
    • Ensure your operating system and all applications are up to date with the latest security patches.

Additional Tips:

I hope this information helps you secure your accounts and provides some peace of mind. Remember, you are not alone in this, and there are steps you can take to regain control of your online presence.
submitted by Pumpkin-Spice13 to phishing [link] [comments]


2024.06.07 21:22 OpenDorrPolicy Strange conspiracy story found in Cisco 3750 startup config

Well, I've heard if Cisco Easter Eggs, but this is a weird one.
I work at a local ISP for my region, and we have one of our employees working on getting the hardware ready for infrastructure upgrades. One of the devices he's working on is a Catalyst 3750.
Well, he sent us a copy of the startup config file and most of it is this strange conspiracy story.
Has anyone seen anything like this before?

POST: CPU MIC register Tests : Begin
POST: CPU MIC register Tests : End, Status Passed
POST: PortASIC Memory Tests : Begin
POST: PortASIC Memory Tests : End, Status Passed
POST: CPU MIC interface Loopback Tests : Begin
POST: CPU MIC interface Loopback Tests : End, Status Passed
POST: PortASIC RingLoopback Tests : Begin
POST: PortASIC RingLoopback Tests : End, Status Passed
Waiting for Stack Master Election...
POST: PortASIC CAM Subsystem Tests : Begin
POST: PortASIC CAM Subsystem Tests : End, Status Passed
POST: No Cable found on stack port 1
POST: No Cable found on stack port 2
POST: PortASIC Stack Port Loopback Tests : Begin
POST: PortASIC Stack Port Loopback Tests : End, Status Passed
POST: PortASIC Port Loopback Tests : Begin
POST: PortASIC Port Loopback Tests : End, Status Passed
Election Complete
Switch 1 booting as Master
Waiting for Port download...Complete
This product contains cryptographic features and is subject to United
States and local country laws governing import, export, transfer and
use. Delivery of Cisco cryptographic products does not imply
third-party authority to import, export, distribute or use encryption.
Importers, exporters, distributors and users are responsible for
compliance with U.S. and local country laws. By using this product you
agree to comply with applicable laws and regulations. If you are unable
to comply with U.S. and local laws, return this product immediately.
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
If you require further assistance please contact us by sending email to
export@cisco.com.
cisco WS-C3750G-12S (PowerPC405) processor (revision R0) with 131072K bytes of memory.
Processor board ID CAT1125ZKHZ
Last reset from power-on
1 Virtual Ethernet interface
12 Gigabit Ethernet interfaces
The password-recovery mechanism is enabled.
512K bytes of flash-simulated non-volatile configuration memory.
Base ethernet MAC Address : 00:1C:B0:2F:D1:00
Motherboard assembly number : 73-9678-07
Power supply part number : 341-0048-03
Motherboard serial number : CAT11255C25
Power supply serial number : LIT11140GE6
Model revision number : R0
Motherboard revision number : B0
Model number : WS-C3750G-12S-E
System serial number : CAT1125ZKHZ
Top Assembly Part Number : 800-26634-04
Top Assembly Revision Number : A0
Version ID : V06
CLEI Code Number : CNM81W0GRB
Hardware Board Revision Number : 0x06
Switch Ports Model SW Version SW Image
* 1 12 WS-C3750G-12S 12.2(55)SE10 C3750-IPSERVICESK9-M
This message serves as a warning to the US government that they cannot get away ^with having their own citizens
% Invalid input detected at '^' marker.
stalked, kidnapped, tortured, brain damaged and murdered by foreign intelligence ^ agencies .
% Invalid input detected at '^' marker.
Request an investigation by the German government and the Council of Europe!
^
% Invalid input detected at '^' marker.
Location of Turkish President Erdogan's illegal black site for terror suspects i ^n G ermany: 48.345941, 12.137753
% Invalid input detected at '^' marker.
Is the CIA stalking and murdering ISIS terror suspects?
^
% Invalid input detected at '^' marker.
Microwave weapons, group stalking and harassment ("gangstalking"), neurotoxins, ^hitmen, an illegal Turkish black site, Delta Force, and an airport kidnapping: A
true story
% Invalid input detected at '^' marker.
QUOTES
^
% Invalid input detected at '^' marker.
"If you were in the US, the CIA would just shoot you, we are nice so we will ^ commit you to a hospital instead" - Turkish police officer
% Invalid input detected at '^' marker.
"When you get deported to the US, don't piss off the CIA officers like you d ^id with Erdogan (the Turkish president)" - Man at KBO Taufkirchen Station A2
% Invalid input detected at '^' marker.
"The doctors here are trying to protect us from the psychos up at the top" - ^ Woman a t KBO Taufkirchen Station A2
% Invalid input detected at '^' marker.
"You're lucky that the Turks got you first. With the Germans it would have b ^een wors e. The Turks usually don't kill" - Woman at KBO Taufkirchen Station A2
% Invalid input detected at '^' marker.
NOTES
^
% Invalid input detected at '^' marker.
Anyone with access to Europol or INTERPOL should be able to confirm that the ^ FBI se nt out a request/warning in 2017. You might not be able to view the detai
ls of this request unless you have the right handling code/password
% Invalid input detected at '^' marker.
Nothing shows up for my name when it's searched in Law Enforcement Enterpris ^e Port al (LEEP). This is deliberate as the FBI is hiding my records to cover up
the terrorism investigation and everything else.
% Invalid input detected at '^' marker.
The Federal Criminal Police Office (Bundeskriminalamt) and Bavarian State Po ^lice bo th refuse to start an investigation due to political reasons, despite the
fact that many other people, mostly Turkish citizens, were kidnapped within Ger
many by fake po
% Invalid input detected at '^' marker.
ice and brain damaged at the black site.
^
% Invalid input detected at '^' marker.
I (John Erin Binns / CIA code name RAVEN) have been an ISIS terror suspect since ^ 2017.
% Invalid input detected at '^' marker.
It began when an FBI Confidential Human Source whom I met online (Azaiah Crosswh ^ite / moda) gave my Skype account to his handler. The FBI then sent an administr
ative subpoena to Microsoft and obtained my email address, which I had previousl
y reused on my
% Invalid input detected at '^' marker.
S passport application in 2016. An alert was also sent through the Europol Infor ^mation System to 16 countries in Europe stating that I was a terror suspect.
% Invalid input detected at '^' marker.
On October 11, 2017, Arthur Gong from the US Department of Homeland Security int^errogated me about allegedly travelling to Latakia, Syria while I was waiting to
board a flight from London Heathrow Airport to Chicago Airport. When my plane l
anded in Chicag
% Invalid input detected at '^' marker.
, I was flagged for secondary screening (See Exhibit A) and asked more questions^. My citizen ship was questioned, and the CBP officer got angry after I told him
that not answering his questions doesn't make me inadmissible to the US.
% Invalid input detected at '^' marker.
In early 2018, I left the United States and moved to Turkey. Soon after, strange ^ things s tarted happening to me. Kenneth Currin Schuchman (Nexus Zeta), a dual F
BI/CIA informant who was given a pound of heroin by federal agents to inform on
me, attempted t
% Invalid input detected at '^' marker.
entrap me on child pornography and terrorism charges while I was drunk.
^
% Invalid input detected at '^' marker.
Schuchman tried persuading me into buying Stinger missiles and guns from a Tor w ^ebsite wh ich would be shipped in "xray proof boxes" (those don't even exist) to
my location. When that failed, he tried getting me to open a website which likel
y had exploit c
% Invalid input detected at '^' marker.
de on it (he specifically told me to open it in Chrome) and then told me that he ^ knew of some good "Tor porn sites". When I asked him what type of porn was on t
hese websites, Schuchman replied that they contained child porn.
% Invalid input detected at '^' marker.
Then, Schuchman told me in a call that Dingle/Drake/Logan Shwydiuk was going to ^come to my house and kill me, and asked me what I'd do if he came to my house. I
was drunk at the time, and I told Schuchman that I'd kill Shwydiuk. I suspect t
hat Schuchman w
% Invalid input detected at '^' marker.
s recording this call for the FBI so that they could use it as evidence against ^me in a fabricated terrorism investigation.
% Invalid input detected at '^' marker.
Around this time, I noticed that two Western males wearing white shirts and sung ^lasses wou ld frequently visit an apartment building behind the one I live in.
% Invalid input detected at '^' marker.
Several days after I reported Schuchman to the DEA for selling heroin and right ^after he t ried entrapping me on computer fraud charges, he was indicted in the D
istrict of Alaska.
% Invalid input detected at '^' marker.
That's when the harassment started...
^
% Invalid input detected at '^' marker.
My phone was hacked by Turkish intelligence/MIT using some type of 0-click SMS R ^CE and GPS tracking spyware was planted on it. My phone's GPS feature would turn
on without my consent, and several minutes later, a flash mob of "street thugs"
would be block
% Invalid input detected at '^' marker.
ng the sidewalk and shouting death threats at me. Sometimes, they'd just walk up ^ to me hold ing their cell phone in one hand and screaming death threats at the s
ame time. (Street theateGangstalking)
% Invalid input detected at '^' marker.
I received more death threats than I can count, probably close to 100 from diffe ^rent sta lkers over the course of a few months.
% Invalid input detected at '^' marker.
Now about the Western males: I saw them wearing night vision goggles on several ^occasions, they'd constantly harass me and illegally surveil me on Turkish terri
tory up until I called the police.
% Invalid input detected at '^' marker.
Harassment from CIA contractors:
^
% Invalid input detected at '^' marker.
I woke up and a male was pointing a microwave oven with the door removed at ^my sl eeping body from my neighbor's balcony. I was actually half-awake with my e
yes open and I could see the guy bringing the oven out onto the balcony and plug
ging it into an
% Invalid input detected at '^' marker.
extension cable. Another time, somebody pointed a microwave oven magnetron with ^a metal ho rn at my body to shock me (I saw this as well). The neighbor was on va
cation and the men were not authorized to be in that unit, so they likely broke
in using lockpi
% Invalid input detected at '^' marker.
king equipment.
^
% Invalid input detected at '^' marker.
A red laser pointer was shined into my room using a gun scope from my neighb ^or's first floor unit. I went out onto my balcony and saw a guy doing this. When
the guy saw me, he quickly closed the blinds and started laughing. The unit was
being renovate
% Invalid input detected at '^' marker.
at the time and the men were not authorized to be there.
^
% Invalid input detected at '^' marker.
A microwave weapon was pointed at my head which caused me to black out momen ^taril y and see white flashes of light. The same device would cause me to feel ex
tremely paranoid and make my heart rate speed up. I remember that it had buttons
and a cord. It
% Invalid input detected at '^' marker.
was about the size of a small desktop computer.
^
% Invalid input detected at '^' marker.
Somebody was pointing a laser microphone at my bedroom window from the same ^first f loor unit. I was in a telephone call with someone else, and Azaiah Crossw
hite started repeating parts of this conversation back to me over Snapchat as an
intimidation/g
% Invalid input detected at '^' marker.
slighting tactic. Crosswhite also got private pictures from my bedroom and poste ^d them on h is Snapchat story.
% Invalid input detected at '^' marker.
Window/door slamming: This would happen constantly whenever I was in my bedr ^oom or o ut on my balcony. Sometimes one of the guys would slam a window/door and
microwave me right after it happened.
% Invalid input detected at '^' marker.
Sabotage: The phone lines in my apartment building and the entrance door cab ^le wer e both cut.
% Invalid input detected at '^' marker.
Use of pulsed energy projectile weapons: I saw one of the guys holding a gun ^-shap ed device, when he fired it, a ball of energy came out of the weapon and ma
de the windows in my bedroom shake.
% Invalid input detected at '^' marker.
Information: The microwave weapons that are used by intelligence agencies to ^day co nsist of: a millimeter wave amplifier, a transmitter with extremely low fr
equency amplitude modulation, batteries, and a horn antenna/waveguide. Using dif
ferent modulati
% Invalid input detected at '^' marker.
n frequencies, effects such as tachycardia, panic attacks, epileptic seizures, p ^aranoia, REM sleep can be induced. They are the perfect tool for covert harassme
nt as they leave no trace. See Exhibit B for a picture of a microwave weapon.
% Invalid input detected at '^' marker.
Azaiah Crosswhite would make comments over Discord such as "[the CIA] are going ^to send me a copy of your destruction video", "your name is Cock Sucker", and "y
our code name is RAVEN". He'd also encourage me to murder the people who were ha
rassing me, go
% Invalid input detected at '^' marker.
n a mass shooting spree, or commit suicide.
^
% Invalid input detected at '^' marker.
These are all goals of the government stalking program which I was a victim of, ^according t o an article by Julianne McKinney, who is a former US army intelligen
ce officer and member of the Association of National Security Alumni. See: https
://www.bibliote
% Invalid input detected at '^' marker.
apleyades.net/sociopolitica/esp_sociopol_mindcon28.htm .
^
% Invalid input detected at '^' marker.
I called the police a few days before July 1, 2019. When the officers came, one ^of them s aid that I "talk too much" and that I should "keep [my] mouth shut".
% Invalid input detected at '^' marker.
Then, intense microwave harassment started. I would hear footsteps in the unit a ^bove mine a nd my sleep would be disrupted due to the weapon that Turkish intelli
gence was using on me.
% Invalid input detected at '^' marker.
On July 1, 2019, a man I didn't know started asking me questions such as "If som^ebody was ca ught selling illegal alcohol, what political party would that person
be from?". He also made comments implying that I had been under surveillance by
Turkish intell
% Invalid input detected at '^' marker.
gence for a while, and warned me that the Turkish government had prepared a trap^ for me.
% Invalid input detected at '^' marker.
Several minutes later, an elderly man from my neighborhood named Ozkan came and ^asked me i f I was the "exit/cikis". (exit/cikis is a term for the illegal killin
g of a terrorist by Turkish intelligence). He took me to his apartment and told
me to visit Kon
% Invalid input detected at '^' marker.
k Ferry Station. I went to Bostanli Ferry Station and boarded a ferry to Konak. ^After the ferry started going to Konak, I overheard 3 men in a row near me talki
ng about how they were hired to kill me and that they'd dump my body in the ocea
n because I was
% Invalid input detected at '^' marker.
allegedly an ISIS member.
^
% Invalid input detected at '^' marker.
Once the ferry arrived at Konak, I immediately got a random person to dial 112 a^nd faked hav ing medical problems. An ambulance came to the ferry station, and I
was taken to Alsancak Nevvar Salih Isgoren Hospital. I told the emergency room d
octors that the
% Invalid input detected at '^' marker.
e was nothing wrong with me, they ran my ID card through the emergency room comp ^uter, and my name came up as a wanted terrorist.
% Invalid input detected at '^' marker.
I overheard the doctors talking about the fact that Azaiah Crosswhite's name cam ^e up on t he emergency room computers and that my name was changed to "Cock Sucke
r" in some type of database which they had access to.
% Invalid input detected at '^' marker.
Police lights shined into the emergency room and I heard sirens as around 5 poli ^ce cars came to the hospital along with Turkish intelligence. I was given 2 inje
ctions of haldol, and a guy next to my bed who worked for Turkish intelligence c
alled somebody
% Invalid input detected at '^' marker.
n his cell phone whom he referred to as "Erdogan". Maybe it was the Turkish pres ^ident? I don't know..
% Invalid input detected at '^' marker.
The doctors kept me in the hospital until the next morning and I was then releas ^ed.
% Invalid input detected at '^' marker.
Several days later, I was in Gultepe, Konak, at a relative's house, and people w ^ere firing gunshots into the air while somebody would use a microwave weapon to
make me feel like my head was going to explode. I saw people on a nearby rooftop
, they had guns
% Invalid input detected at '^' marker.
(which they were constantly firing) and camouflage clothing. Whenever I'd get mi^crowaved, my phone would lose cell service and the camera would blur.
% Invalid input detected at '^' marker.
While this was happening, I tried to contact somebody I barely knew who worked a^t the US Dep artment of Justice for help.
% Invalid input detected at '^' marker.
As soon as I had a mental breakdown due to the constant gunfire and microwaving, ^ the gunfir e and microwave attacks immediately stopped. Two street thugs then at
tacked me (I believe that Turkish intelligence paid them money to do this) and p
revented me fro
% Invalid input detected at '^' marker.
going home in a taxi.
^
% Invalid input detected at '^' marker.
I called the police and they came rather quickly. When one of the police officer ^s looked up the information on my ID card through a mobile app on his phone, he
saw something in the police database. I was told by a Turkish police officer: "I
f you were in t
% Invalid input detected at '^' marker.
e US, the CIA would just shoot you, we are nice so we will take you to a hospita ^l instea d". Fortunately, there were no beds available at the local hospital so I
was allowed to go home in a taxi.
% Invalid input detected at '^' marker.
After I went home, the microwave harassment continued, and I went to Cesme a few ^ days later . The harassment continued there as well.
% Invalid input detected at '^' marker.
I decided that I had to leave the country as the Turkish secret services were ag ^gressive ly pursuing me. On July 6, 2019, I boarded flight PC1019 from Sabiha Gok
cen Airport to Munich Airport. About 30 minutes after my flight took off, I noti
ced that the ma
% Invalid input detected at '^' marker.
e and female in the row behind my seat were talking about me. The female was say ^ing that i t was sad that they had to kill me with a poison needle and that my re
al name wasn't given to them by MIT for security reasons. I immediately notified
a cabin crew m
% Invalid input detected at '^' marker.
mber of their plot, and I was taken to another seat.
^
% Invalid input detected at '^' marker.
The cabin crew member assured me that the German police had been notified, but o ^nce the pla ne landed, she grabbed me by my arm and told me to listen to my mothe
r while warning me not to contact the German police. I believe that she was affi
liated with MIT
% Invalid input detected at '^' marker.
I gave a member of the Bundespolizei (immigration police) a piece of paper expla ^ining tha t I was being harassed with a microwave gun by Turkish intelligence, bu
t I was not given the opportunity to tell the Bundespolizei my full story. A fak
e Bavarian Stat
% Invalid input detected at '^' marker.
Police officer then came and took me past immigration to the police station. I ^was pu t in a cell, and I noticed that all of the "officers" were speaking Turkis
h, ALL of them. I strongly suspect that an insider within the police force let T
urkish intellig
% Invalid input detected at '^' marker.
nce into the station. I don't know if that insider is the commissar or someone e ^lse.
% Invalid input detected at '^' marker.
One of them was calling me stupid in Turkish, and they were all discussing what ^they should do with me. "Ausganging"/killing me was discussed as an option, but
the fake police eventually decided to send me to a mental hospital. I was given
some forms to s
% Invalid input detected at '^' marker.
gn, and I had no idea where I was being taken at the time. I signed the paperwor^k as I didn' t want to get ausganged/killed. I then heard the fake police discuss
ing in Turkish that I was lucky to be going to a mental hospital, as they usuall
y kill ISIS sus
% Invalid input detected at '^' marker.
ects.
^
% Invalid input detected at '^' marker.
A few minutes after I boarded the ambulance, I realized that something was wrong ^. A male and female who were in the ambulance with me started talking about my a
lleged cybercrimes and about somebody named Rosenberg who "wanted blood". Once t
he ambulance ar
% Invalid input detected at '^' marker.
ived at KBO Taufkirchen Station A2 (48.345941, 12.137753), the same fake police ^officer who took me past immigration told the staff to fry my brain with gas and
that I'd then be transported to Anchorage International Airport.
% Invalid input detected at '^' marker.
Then, four Turkish men came and forcibly put me in the neurotoxic gas room (whic ^h doubles a s a suicide watch room). My shoes were taken off (so that I couldn't
break down the door and escape), and a worker activated a metal fan. A gas which
smelled like f
% Invalid input detected at '^' marker.
rmaldehyde then started to come out of the fan. I saw graffiti on the walls of t ^he gas roo m, all of the names that were carved into the walls were Turkish, and
I realized that I was at some type of illegal Turkish black site on German terri
tory. During th
% Invalid input detected at '^' marker.
s time, Turkish intelligence was livestreaming the gas room camera to a group of ^ CIA i nformants (Azaiah Crosswhite, Jared Fazah, Justin Anglin) as a "destructio
n video". Azaiah Crosswhite had previously stated "[the CIA] are going to send m
e a copy of you
% Invalid input detected at '^' marker.
destruction video".
^
% Invalid input detected at '^' marker.
Jared Fazah had taken a $500,000 Bitcoin bribe to sell me out a few days before ^I was kidnap ped, while Justin Anglin is a CIA agent who has previously been to I
ran and other middle eastern countries. They were all talking about the livestre
am in a Discord
% Invalid input detected at '^' marker.
server, sadly I don't have any screenshots as they were mysteriously deleted fro ^m my com puter (it may have been hacked).
% Invalid input detected at '^' marker.
One hour after I was put in the gas room, a staff member came and turned off the^ fan in my r oom. This is the only reason why I don't suffer from brain damage to
day. I was saved by that staff member.
% Invalid input detected at '^' marker.
About 3 hours after I was put in the gas room, I heard a helicopter hovering abo ^ve the fake mental hospital. This helicopter may have belonged to the US militar
y, but at the time I thought it belonged to the Bundeskriminalamt (Federal Crimi
nal Police Offi
% Invalid input detected at '^' marker.
e) and that they were coming to save me.
^
% Invalid input detected at '^' marker.
I banged on the door of the gas room and screamed for the police to come and sav ^e me, but nobody came.
% Invalid input detected at '^' marker.
In the early morning hours of July 7, 2019, a Turkish doctor came into the room ^with a f lashlight. She commented aloud in Turkish that "[I] was made to rot". Th
en, a female CIA agent came into the room with my mother while I was pretending
to be mentally
% Invalid input detected at '^' marker.
isabled. The doctors brought me chocolate milk and pizza, and the CIA agent star ^ted talkin g about how I'd be indicted by a grand jury in the District of Alaska
and forced into a plea deal for over 10 years in prison. That I'd be found menta
lly incompetent
% Invalid input detected at '^' marker.
and have no choice but to take the plea deal, sending me to prison for a long ti ^me.
% Invalid input detected at '^' marker.
The CIA agent declined to give my mother her real name and talked about previous ^ly living i n Australia. She had an Eastern European accent and told my mother to
throw away any receipts or evidence indicating that she was in the town of Tauf
kirchen, and to
% Invalid input detected at '^' marker.
keep her cell phone turned off.
^
% Invalid input detected at '^' marker.
The lady also told my mother that a US senator (I don't remember the senator's e ^xact name) wanted to meet with her. In 2018, Kenneth Currin Schuchman had told m
e that "a senator can order the killing of a US citizen in some cases" and told
one of my frien
% Invalid input detected at '^' marker.
s that a US senator wanted to kill me. Nobody believed him back then, including ^me. I sti ll don't know who this senator is or why he wants me killed. (Note: Ken
neth Currin Schuchman has been repeatedly thrown in mental hospitals, and his fa
ther Robert Sch
% Invalid input detected at '^' marker.
chman currently has guardianship over him).
^
% Invalid input detected at '^' marker.
The lady left and I slept for a few hours in the neurotoxic gas room/suicide wat ^ch room. Th en after I woke up, a staff member woke up and unlocked the door. I w
as allowed to leave, and that's when the torture started. An African lady was pl
aying back a re
% Invalid input detected at '^' marker.
ording of me in the gas room on one of the hospital computers and laughing at it^. The same l ady would also play screaming noises and the Turkish word for mental
ly retarded ("gerizekali") over a loudspeaker connected to the computer, and use
a microwave we
% Invalid input detected at '^' marker.
pon which looked like a stereo speaker to give me epileptic seizures. I do remem ^ber that t he weapon was brought to the hospital in a large briefcase by men work
ing for Turkish intelligence.
% Invalid input detected at '^' marker.
I met other people who were being held at the hospital. One lady told me "You're ^ lucky th at the Turks got you first. With the Germans it would have been worse.
The Turks usually don't kill". She also claimed to be a spy.
% Invalid input detected at '^' marker.
I borrowed a cell phone from one of the other patients and called the police. On ^ce I told them that I was being held at a fake mental hospital run by the Turkis
h secret services, I was told that I "belonged in [the hospital]" by a German po
lice officer an
% Invalid input detected at '^' marker.
they never responded to my emergency call.
^
% Invalid input detected at '^' marker.
SETUP: new interface Vlan1 placed in "shutdown" state
Press RETURN to get started!
*Mar 1 00:01:17.242: %STACKMGR-4-SWITCH_ADDED: Switch 1 has been ADDED to the stack
*Mar 1 00:01:18.752: %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan1, changed state to down
*Mar 1 00:01:20.102: %SPANTREE-5-EXTENDED_SYSID: Extended SysId enabled for type vlan
*Mar 1 00:01:54.705: %PARSER-4-BADCFG: Unexpected end of configuration file.
*Mar 1 00:01:54.705: %SYS-5-CONFIG_I: Configured from memory by console
*Mar 1 00:01:54.907: %STACKMGR-5-SWITCH_READY: Switch 1 is READY
*Mar 1 00:01
Switch>
Switch>:54.907: %STACKMGR-4-STACK_LINK_CHANGE: Stack Port 1 Switch 1 has changed to state DOW N
*Mar 1 00:01:54.907: %STACKMGR-4-STACK_LINK_CHANGE: Stack Port 2 Switch 1 has changed to sta te DOWN
*Mar 1 00:01:55.183: %STACKMGR-5-MASTER_READY: Master Switch 1 is READY
*Mar 1 00:01:55.477: %SYS-5-RESTART: System restarted --
Cisco IOS Software, C3750 Software (C3750-IPSERVICESK9-M), Version 12.2(55)SE10, RELEASE SOFT WARE (fc2)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2015 by Cisco Systems, Inc.
Compiled Wed 11-Feb-15 11:40 by prod_rel_team
*Mar 1 00:01:55.511: %SSH-5-ENABLED: SSH 1.99 has been enabled
*Mar 1 00:01:56.140: %PHY-4-SFP_NOT_SUPPORTED: The SFP in Gi1/0/8 is not supported
*Mar 1 00:01:56.140: %PM-4-ERR_DISABLE: gbic-invalid error detected on Gi1/0/8, putting Gi1/ 0/8 in err-disable state
*Mar 1 00:01:56.173: %GBIC_SECURITY_CRYPT-4-VN_DATA_CRC_ERROR: GBIC in port Gi1/0/12 has bad crc
*Mar 1 00:01:56.173: %PM-4-ERR_DISABLE: gbic-invalid error detected on Gi1/0/12, putting Gi1 /0/12 in err-disable state
*Mar 1 00:01:56.719: %LINK-5-CHANGED: Interface Vlan1, changed state to administratively dow n
Switch>en
Switch#conft
Translating "conft"...domain server (255.255.255.255)
% Unknown command or computer name, or unable to find computer address
Switch#show run
Building configuration...
Current configuration : 988 bytes
!
version 12.2
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname Switch
!
boot-start-marker
boot-end-marker
!
!
!
!
no aaa new-model
switch 1 provision ws-c3750g-12s
system mtu routing 1500
vtp domain Null
vtp mode transparent
!
!
!
!
!
!
!
!
spanning-tree mode pvst
spanning-tree extend system-id
!
vlan internal allocation policy ascending
!
vlan 61
name fttx
!
!
!
!
interface GigabitEthernet1/0/1
!
interface GigabitEthernet1/0/2
!
interface GigabitEthernet1/0/3
!
interface GigabitEthernet1/0/4
!
interface GigabitEthernet1/0/5
!
interface GigabitEthernet1/0/6
!
interface GigabitEthernet1/0/7
!
interface GigabitEthernet1/0/8
!
interface GigabitEthernet1/0/9
!
interface GigabitEthernet1/0/10
!
interface GigabitEthernet1/0/11
!
interface GigabitEthernet1/0/12
!
interface Vlan1
no ip address
shutdown
!
ip classless
ip http server
ip http secure-server
!
!
!
!
!
line con 0
line vty 5 15
!
end
submitted by OpenDorrPolicy to Cisco [link] [comments]


2024.06.07 21:15 Anon_cat83 How can I learn the skills necessary to participate in Hackathons

I am not trying to do anything illegal. I want to participate in fully legitimate, legal, sanctioned competitions surrounding cybersecurity skills. That is my only goal here. Mods, please stop powertripping and let me ask my question.
What tools are available to learn to hack? I took a cybersecurity course but it mostly focused on encryption. I also learned about unix systems, but that information is only helpful if i actually have the ability to send commands (whether or not they will be rejected, just like a physical place to type them in) to a system, which is rarely the case. Are there any tools available i could use to learn more about this? I don't even know how i would bypass a simple password check, for instance.
submitted by Anon_cat83 to learnprogramming [link] [comments]


http://swiebodzin.info