Tumgik
#weev
whats-in-a-sentence · 20 days
Text
In his How To, he lists the skills hackers should acquire first:
Learn C.²²
Learn just a little bit of x86 assembler.²³ You don't have to be great at this at first, but you need to sort of kind of know what the fuck is going on.
Work through Hacking: The Art of Exploitation by Erickson.
Learn JavaScript.
Go through the big exploit archives. Star in the 1990s. Look through exploits. Figure out how they worked. Turn the clock forward to the modern era, so you slowly accustom yourself to newer exploitation techniques.
Get really good at x86 assembler, and learn IDA Pro and OllyDbg.
22. C is a general-purpose, machine-independent programming language that was used to write a range of well-known applications – from Windows operating systems to Oracle databases.
23. x86 assembler is a programming language used for time-sensitive applications and detailed software systems.
"Going Dark: The Secret Social Lives of Extremists" - Julia Ebner
33 notes · View notes
coolbugs · 1 year
Text
Tumblr media
Bug of the Day
Smol weev I found on the tip on an elm leaf the other night. Phyllobius oblongus, the brown leaf weevil. Name seems to fit LOL
59 notes · View notes
tenth-sentence · 20 days
Text
I tell him that I'm interested in learning how to hack and whether he has any tips.
"Going Dark: The Secret Social Lives of Extremists" - Julia Ebner
1 note · View note
oh-dear-so-queer · 20 days
Text
In 2009, Weev hacked Amazon and temporarily deleted all gay and lesbian romance novels from the online shop, causing a billion-dollar fall in the company's stock price. The black-hat hacker said he wrote a script that helped him to find all gay- and lesbian-themed books. He then used invisible iFrames, which are normally used to insert advertisements into websites, to exploit the complaint feature on the Amazon website. This 'caused huge numbers of visitors to report gay and lesbian items as inappropriate without their knowledge', according to Weev.
"Going Dark: The Secret Social Lives of Extremists" - Julia Ebner
1 note · View note
skitter-queen · 4 days
Text
Weevils are curious
creatures of furious
hunger for baby oak fuel;
They drill through the surface
of acorns with purpose,
frackers with snouts as their tool.
85 notes · View notes
hellhoundlair · 6 months
Text
Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media
FEAR STREET (2021) X SUPERNATURAL (2005 - 2020) or: moments from Fear Street that made me think "omg! just like sam and dean!"
Tumblr media
115 notes · View notes
confusedlittleguy · 3 months
Text
um,, this is probably a very obvious thing but i havent seen anyone else say it,,
if alastor did make a deal with lilith and she was in heaven for those seven years whne she dissapeared then she probably just took alastor with her?
idk just a thought,, also srry if i phrased this confusingly,, i havent written anything down in a long time
16 notes · View notes
adragonsfriend · 2 months
Text
So I was doing *research* for BhoT and I came across this on the wookiepedia page for Sidious:
"The duo met for the first time when Tarkin was still a cadet of the Sullust Sector Spacefarers Academy, and while Palpatine was still apprenticed to Plagueius"
Like awww, Sidious and Tarkin met when they were both still in school! Basically high school sweet hearts. If they'd gone to the same school they could've started a club together;
call it the WCS,
War Crime Squad
Tumblr media Tumblr media
These were the most normal-person-emotive pictures of them available
3 notes · View notes
aftonenterprise-moved · 9 months
Text
i want to care about the new arcs of fnaf so bad especially while being a vanessa stan but oh my goodness i cannot get into it and i want to say its because michael isn't there but honestly michael wasnt there before. but i hadn't had it broken down to me exactly HOW intertwined security breach was to the novels until very recently with the explanation of where glitchtrap came from and its sooooo ohhhh my goddddd oh my goddddddd (plugging my ears) LAAALALALALALLALA
8 notes · View notes
lllstar-blanketlll · 5 months
Text
I just realized how many ends I'm going to have to weeve in for my granny square blanket
5 notes · View notes
whats-in-a-sentence · 20 days
Text
Aside from learning these technical skills, he also recommends a range of infiltration and forgery techniques to get around security boundaries that cannot be solved with hacks alone:
Get jobs fill roles that you might find useful to compromise people working within the future. This means sysadmin stuff, helpdesk stuff, etc. Also, you can usually get into everything at a company just by being hired as a sysad. If you can talk your way into a systems role repeatedly, you don't need zero-days,²⁵ you can get given the keys to everything.
Getting a job as a skiptracer²⁶ in the collections industry will give you access to datasets that will turbocharge your ability to dox individuals.
Become a more competent programmer by submitting git pull²⁷ requests for fixes on outstanding bugs and desired features on well used open source products. Get a dev job.
Try to talk your way into restricted areas, and call up random support lines and talk then into giving you sensitive customer information. This is a hugely useful skill.
Learn to pick locks and break into buildings that you have permission to be in (riskless if you get caught but actually lets you field test barging through locked doors and evading security).
Practice credential forgery very often, just takes photoshop and a print shop.
Read poetry, particularly 19th century stuff and really old epics, eddur, and sagas. Sounds weird but it gives you hide insight into manipulating people with language.
For the same reasons, getting copyediting positions in advertising where multivariate testing is done is also a useful thing. Same with learning hypnosis, cold call sales, all sorts of things.
25. A 0-day is a form of cyberattack that exploits a vulnerable spot in software that is unknown or unaddressed by the software vendors.
26. A skiptracer is a person whose main job is is to geolocate and track down individuals.
27. A git pull is a command used to download and change content from a remote repository.
"Going Dark: The Secret Social Lives of Extremists" - Julia Ebner
0 notes
chaoscradle · 6 months
Note
trick or treat (i love sending you mpreg it has become a genuine hobby)
Tumblr media
trick bc wow rude /j
3 notes · View notes
tenth-sentence · 20 days
Text
'I would still do this if it were a fruitless endeavor,' he writes.
"Going Dark: The Secret Social Lives of Extremists" - Julia Ebner
1 note · View note
sq1shy-fr0g · 7 months
Text
Tumblr media
This man here^
Can solo anyone with hardens heart and leach. /SRS
5 notes · View notes
skitter-queen · 11 months
Text
cant sleep. lemme try counting weevils
🪲 one
🪲 two
🪲 three
🪲 four
🪲 five
🪲 six
🪲 seven
🪲 eight
🪲 nine
🪲 ten
🪲 eleven
🪲 twelve
🪲 thirteen
🪲 fourteen
🪲 fifteen
🪲 sixteen
🪲 seventeen
🪲 eighteen
🪲 nineteen
🪲 twenty
🪲 twenty-one
🪲 twenty-two
🪲 twenty-three
🪲 twenty-four
🪲 twenty-five
🪲 twenty-six
🪲 twenty-seven
🪲 twenty-eight
🪲 twenty-nine
🪲 thirty
🪲 thirty-one
🪲 thirty-two
🪲 thirty-three
🪲 thirty-four
🪲 thirty-five
🪲 thirty-six
🪲 thirty-seven
🪲 thirty-eight
🪲 thirty-nine
🪲 forty
🪲 forty-one
🪲 forty-two
🪲 forty-three
🪲 forty-four
🪲 forty-five
🪲 forty-six
🪲 forty-seven
🪲 forty-eight
🪲 forty-nine
🪲 fifty
48 notes · View notes
darudedogestorm · 8 months
Text
bug type eeveelution weeveon
4 notes · View notes