Комментарии:
Thanks for enlightening
Ответить@Davidbombal this video is gold. It's led me to a whole lot more of trying to understand using a set of servers (so to speak) as a layer of protection and anonymity!!
ОтветитьI can hear some morrocan accent
ОтветитьI can tell the dude got a north American accent. He might be morrocan or Algerian 😏
ОтветитьWonder how y'all can make this videos less boring, just get straight to the point and done be boring. It sounds like a great topic but this is a marketing video instead of information
ОтветитьI am short of words to express how much I appreciate BAGPUSHER efforts in holding me closely,through my hard times. Thanks so much for putting me thru all the credit card things
Ответитьstraight up ignoring the "for educational purposes" in this one 🤣
ОтветитьSick! Why do u have to choose that silly name? You could have chosen different names. You aren't mentally capable...
ОтветитьIndeed David B, you the true guy to follow regarding ethical hacking career.
ОтветитьBut I am getting help that I need.
ОтветитьI am a victim of identity theft. This hacker is remotely controlling my android phone with a computer and I am a 60 year and I am not computer literate. How can I get help?
ОтветитьYou need to do a series on how Ai is beginning to support/replace/improve pen and hack testing...
ОтветитьOh my god. I thought I was the only one who thought ctfs are puzzles. I love ctfs, but some of them are silly loopholes and I sit there thinking "no way this is what red teamers actually do".
ОтветитьUse A.I. to help
ОтветитьMark 9:45
And if your foot causes you to sin, cut it off. It is better for you to enter life lame, rather than having two feet, to be cast into hell, into the fire that shall never be quenched—
Matthew 5:30
And if your right hand causes you to sin, cut it off and cast it from you; for it is more profitable for you that one of your members perish, than for your whole body to be cast into hell.
Hack a Gremlin!
ОтветитьThank you, Great, 👍
Ответитьlan har to heck loik a gorst
ОтветитьThank you for this awesome video!
ОтветитьI tried CTF once. I didn't get it. Perhaps I'm not cut out for it. Trying to learn from OTW Linux command line for hackers book. Kali would install in virtual box under Ubuntu 64 but not Debian 64 as per book instructions. I will persevere. Random comment I know. Thank you for your content.
ОтветитьHey, is it really possible to change exam grades without getting caught?
ОтветитьThis one gave me some serious thinking, appreciate the video and topics covered.
Ответитьholy shit I just found this channel. It's amazing.
ОтветитьMr. Robot is right lol.
ОтветитьDoes there ever come a point where excessive attempts at security CAUSE agencies to take interest and put in lots of effort?
I'd expect that 200 groups of five figures could be secure BUT terribly interesting to "an agency". Look at the long term fascination with "numbers stations".
Your Brain is just like a Computer Hard Drive You cant Delete anything But you can Re-Write over it 😉
ОтветитьThe Minute You Release Anything and Dont Copyright it - It's obsolete
Hey Bro You Want Someone Under Your Wing ?
I AM ONE OF THE MOST HUNGRY TO LEARN EVERYTHING AND I HAVE PRACTICE AND I HAVE THE FIRE TO LEARN EVERYTHING ESPECIALLY HACKING 😉
Beside the censorship, this vidéo is almost technically useless and waist of time.
ОтветитьBrave or kiwi browser?
ОтветитьI don't think there's many hackers anymore. Just people who want to be corporate slaves instead of cooperatives and profit sharing. Most hackers in the past hated corporations because they are eroding the human soul. Making people debt slaves who have ownership over nothing.
ОтветитьProtonvpn is a honeypot lol
Ответитьwhat about people just getting into computer services
ОтветитьHi David,
Do you have a video on how to downloading the tor browser bundle.
Sir will you help as your subscriber🥺
I'm from bangladesh.
I think I exactly know and feel t/his pain... its across the whole IT Sector... it goes deepee and deeper and deeper, after years you are a so called Full-Stack Developer, knows how to code in many lenguages, knowing server architecture, adminstration, design patterns, security basics, plattforms, systems ... until u start figgering out - it has no end. And it will never end. And as exponential he calls the learning process, the developing process for new systems, new program languages, new tools, is annyoing after all. What in fact was a webdesigner yesterday can be splitted up in more than 5 University Degrees today. What a run. And get his words... I have another methaper for it. Just imagine you have an accident, fall inzo coma for 1-3 years and everything you know... is pretty much useless nowadays. From senior to junior in speed of light. I know no other branche where game is so hardly played.
ОтветитьDigital forensics is also necessary 😅👍🔥🔥🔥
Ответитьdon't want to read a longwinded book or watch a vacuous interminable video I want a list of doables and what to google to get to them
ОтветитьGreat interview
ОтветитьIt took me a week to learn python and now up for a programming position at my company 😂 so yeah the want to learn Is way more important than knowing everything
ОтветитьHack like a po😐
Ответитьnumber zero and one get erased , lost or changing then nothing will work in planet :)
ОтветитьI feel like one of the hardest things in cybersecurity is choosing what kind of information and whom it comes from. Because of the huge plethora of information out on the internet, you can easily fall into the rabbit hole of learning so many different aspects of cybersecurity that you become knowledgeable in many things, but master none. Thoughts?
ОтветитьGreat content! Perfect audio and video quality. Very enjoyable to watch.
Ответитьthese videos are always so good
ОтветитьHI David , what device would be used and how to detect where it is - cell is being routed and all pc coms are being edited / deleted . it is like being in a bubble they control .
ОтветитьPlease Help me sir Please
Ответить