>>130 Its a two part picture, one is a lion being restrained with its head obscured by a plate with a hole(labeled Backend), the other is a plate with a hole and "Metro Goldwin meyer" lion picture(labeled Frontend). It seems to be a humorous observations that back-end software is very different from the polished front-end experience.
I have seen many boards, but this one really has the highest quality discussion of dubs.
Name:
Anonymous2018-09-21 11:27
>>133 it's actually amateur hour compared to dubs-related discussions on the old progrider. I think progrider threads have been imported here so try looking for the one about dubs theory and dubsless primes.
you've heard of programming music, but have you heard of programming food?
Name:
Anonymous2018-09-23 2:41
most programming is lame but learning infosec and computer science at the same time is awesome because you learn about categories of vulnerabilities and then you can write your own security tools/exploits instead of being some drone who only knows how to run tools other people made
i am feeling happy for the first time in a long time Edited on 23/09/2018 02:41.
most programming is lame but learning infosec and computer science at the same time is awesome because you learn about categories of exploits and then you can write your own security tools instead of being some drone who only knows how to run tools other people made
most programming is lame but learning infosec and computer science at the same time is awesome because you learn about categories of vulnerabilities and then you can write your own security tools/exploits instead of being some drone who only knows how to run tools other people made
i am feeling happy for the first time in a long time
What tech-related thing are you learning about right now? I'm currently learning about port scanning with nmap. It has a scripting engine that uses lua. Have any of you ever programmed in lua? What's it like? I am mostly familiar with Java but I've used some other languages too.
>>142,145 oh, I thought I'm the only security anon here. I'm writing software that automatically reverse engineers some Android IPC stuff so I can do automated fuzzing of closed-source vendor bloatware
Name:
Anonymous2018-10-06 16:46
I feel like, if a device is so fragile that it crashes when you run an nmap scan with the aggressive flag, that's not the problem with the port scanner, that's a problem with the device or software being an unreliable piece of shit
don't blame pen testers when your garbage barely runs and can't handle a simple port scan
Name:
Anonymous2018-10-06 16:50
I'm the Terry Davis of hacking
Name:
Anonymous2018-10-06 17:03
God is root and we are regular user accounts. How can we achieve spiritual privilege escalation? Can we do rm -rf --no-preserve-root / on the universe?
Name:
Anonymous2018-10-06 18:12
>>151 You need to achieve satori then you escape chroot jail