Ana içeriğe atla

Can Yücelsiz Bir Akım

Bağlanmayacaksın javaya, öyle körü körüne.
“O olmazsa yaşayamam.” demeyeceksin.
Demeyeceksin işte.
Yaşarsın çünkü.
Öyle Ceo laflar etmeye gerek yok ki.
Çok zorlamayacaksın mesela. Kayışı koparabilirsin.
Ve zaten genellikle kopar zaten o kayış,
Çok kodlamazsan, çok sıyırmazsın.
Çok debelenmeyince, çok uyanık kalmazsın hem.
Hatta C#’ı , C’yi bile çok sahiplenmeyeceksin.
Senin değillermiş gibi davranacaksın.
Hem hiçbir dilin olmazsa, korsandan da
korkmazsın.
Onlarsız da yaşayabilirmişsin gibi davranacaksın.
Çok düzenli olmayacak kodların mesela.
Debuglarla erorlarla yazabileceksin.
İlle de bir şeyleri sahipleneceksen,
Yapayzekanın grafiklerle birleştiği oyunları sahipleneceksin.
CrySis’i sahipleneceksin,
COD, COO, PES’i…
Mesela NFS, senin oyunun olacak.
“O benim.” diyeceksin.
Çok sahiplenmeden, Çok ait olmadan yaşayacaksın.
Hem her an mavi eran vercekmiş gibi, Hem
de high quality kalacakmış gibi kullanacaksın bilgisayarı.

İlişik yaşayacaksın. Ucundan tutarak…

Bu blogdaki popüler yayınlar

Denial-of-Service (DoS) Tools & Techniques

Denial-of-Service (DoS) Tools & Techniques Welcome back, my fledgling hackers! Over the years, we have examined multiple ways to own, exploit, or compromise a system. On the other hand, we have not spent a lot of time on denial-of-service (DoS) attacks. For those of you who are new here, a denial of service is basically a simple attack that keeps the target system from operating as it should. In its simplest form, it uses up all of the system resources so that others can't connect. More sophisticated attacks will cause the system to crash or create a infinite loop that uses all of the system's CPU cycles. In general, a DoS attack is the easiest and least sophisticated type of attack. Some have gone so far as to say that an eight-year-old could participate in a DoS attack, and there is some truth to that statement since some tools make it as easy as putting in an IP address and hitting "Start." In recent years, DoS and DDoS attacks (the latter of whic...
Hacking Facebook,Twitter,Instagram Account Passwords with BruteForce After a long time, I Present you,  Faitagram . I was disappointed, no one replied to  this Anyway enough talking, Lets get right into the tutorial. Step 1 Getting Ready By the way, Faitagram stands for Fa(cebook)(tw)it(ter)(inst)agram. To clone the script, what you need to type in the terminal is : git clone  https://github.com/Juniorn1003/Faitagram.git/ —  Faitagram To clone the Faitagram script. After you cloned, type "ls" to see what is inside the folder. After you typed that, you would see 5 things : License, Readme, faitagram, setup.py and wlist. License  is just a MIT license,  Readme  has informations about the script on it,  faitagram  is the main source,  setup.py  is for the installing dependencies, and  wlist  is a wordlist. You have that? Now lets chmod the files so we can access it. chmod +x faitagram &...

Get Anyone's Wi-Fi Password Without Cracking Using Wifiphisher

Do you need to get a Wi-Fi password but don't have the time to   crack it ? In previous tutorials, I have shown how to crack   WEP ,   WPA2 , and   WPS , but some people have complained that cracking WPA2 takes too long and that not all access points have WPS enabled (even though quite a few do). To help out in these situations, I present to you an almost surefire way to get a Wi-Fi password without cracking— Wifiphisher . Steps in the Wifiphisher Strategy The idea here is to create an  evil twin AP , then de-authenticate or DoS the user from their real AP. When they re-authenticate to your fake AP with the same SSID, they will see a legitimate-looking webpage that requests their password because of a "firmware upgrade." When they provide their password, you capture it and then allow them to use the evil twin as their AP, so they don't suspect a thing. Brilliant! To sum up, Wifiphisher takes the following steps: De-authenticate the user from their legi...