I want to hack into my hacker's computer
-
Oh I have his ip. Bitdefender Report -------------------- A port scan was detected and blocked: 2013-08-19-08:46:59 Local IP: 71.85.107.43 Remote IP: 72.21.81.253 Protocol: TCP
-
Oh I have his ip. Bitdefender Report -------------------- A port scan was detected and blocked: 2013-08-19-08:46:59 Local IP: 71.85.107.43 Remote IP: 72.21.81.253 Protocol: TCP
Member 10218314 wrote:
72.21.81.253
As you can see here[^], you're not the only one that has a complaint about this IP.
The quick red ProgramFOX jumps right over the
Lazy<Dog>
. My latest article: Understand how bitwise operators work (C# and VB.NET examples) My group: C# Programmers Group -
Quote:
Moscow's Central administrative district has yet to establish a motive for Kushnir's death, but is treating the case as murder.
I wonder...
Quote:
He was killed by repeated blows to the head,
...perhaps it was a suicide?
- I would love to change the world, but they won’t give me the source code.
-
And fish wrapped news paper to send em a "message" (I'd say a horses head, but peta would have an issue).
///////////////// -Negative, I am a meat popsicle. Two goldfish in a tank and one says, "how do you drive this thing?"
-
And fish wrapped news paper to send em a "message" (I'd say a horses head, but peta would have an issue).
///////////////// -Negative, I am a meat popsicle. Two goldfish in a tank and one says, "how do you drive this thing?"
-
Quote:
Moscow's Central administrative district has yet to establish a motive for Kushnir's death, but is treating the case as murder.
I wonder...
Quote:
He was killed by repeated blows to the head,
...perhaps it was a suicide?
- I would love to change the world, but they won’t give me the source code.
-
Quote:
Moscow's Central administrative district has yet to establish a motive for Kushnir's death, but is treating the case as murder.
I wonder...
Quote:
He was killed by repeated blows to the head,
...perhaps it was a suicide?
- I would love to change the world, but they won’t give me the source code.
-
Do the phone activation. This should usually circumvent the restriction. If not call the support line and explain them that you had to do a clean installation because of a virus infestation.
Agreed. I've never had a phone activation fail despite the install counter being too high for the auto install to work. (I suspect this would fail if you're trying to use a key downloaded from TPB or the like.)
Did you ever see history portrayed as an old man with a wise brow and pulseless heart, waging all things in the balance of reason? Is not rather the genius of history like an eternal, imploring maiden, full of fire, with a burning heart and flaming soul, humanly warm and humanly beautiful? --Zachris Topelius Training a telescope on one’s own belly button will only reveal lint. You like that? You go right on staring at it. I prefer looking at galaxies. -- Sarah Hoyt
-
Pretty sure I've seen that before. Something close enough too look familiar anyway. The deleting a CDR line is rather memorable. :laugh:
Did you ever see history portrayed as an old man with a wise brow and pulseless heart, waging all things in the balance of reason? Is not rather the genius of history like an eternal, imploring maiden, full of fire, with a burning heart and flaming soul, humanly warm and humanly beautiful? --Zachris Topelius Training a telescope on one’s own belly button will only reveal lint. You like that? You go right on staring at it. I prefer looking at galaxies. -- Sarah Hoyt
-
I've been having hacking trouble for I believe just one hacker. It's been going on for over a year now. I got a vb portscan program to find open ports. What then?
Don't understand why you would want to hack into his computer. Would understand wanting to roast him over a low fire.
-
-
Forogar wrote:
...perhaps it was a suicide?
I like to think of it as "baseball bat to the head" spam.
-
Don't understand why you would want to hack into his computer. Would understand wanting to roast him over a low fire.
I look at it as a challenge. Stopping this person from gaining access to my computer is a win for me and frustration for him. You see hackers, they have an illusions of grandeur type personality. They think that just because they can gain entrance to another person's computer makes them king of the world. I'm here to prove otherwise! He's still using the same old tricks but the tools to defend against hackers are getting better. His days of being a hacker will soon come to an end and I just want to be around to laugh at him. He who has the last laugh laughs best!