The scrap value of a hacked pc


















Like eagle. And you know how things worked out for him. It is going to workout for your dumbass "friend" here too. Post by LegionX We're "playing" with him currently - much like a cat does a mouse they caught.

And you know what happens to the mouse when playtime is over. Post by LegionX So that begs the question. If you are really his friend - why do you 1 keep your mouth shut here about Gremlin and the results of his interaction with two people who like snit - attacked him. And in Eagles case - threatened his family. Oh wait - just like snit has. Post by LegionX For reasons unknown to us. Post by LegionX - you stepped into the middle of a conversation between them.

Do you remember what you wrote to snit? Post by LegionX You know snit lies about him often. Post by LegionX You've corrected snit once before. Why did you do that? Otherwise you still support snit when he lies. Why do you do that? For example, He claims that Gremlin is a functionally illiterate fraud. Post by LegionX Unless you're willing to claim that Gremlin snowed hundreds of people for decades about him being a Hacker - you know snit is writing from his ass.

Why do you remain silent as you read things he's written that you know are lies about Gremlin? Post by LegionX Don't worry David - we aren't expecting a reasonable answer to our legitimate questions. We know that you don't want to make things worse for snit by becoming another poster who exposes his lies. Answer us this question though if you will. Why did you beg Gremlin several times - upto the point of trying to hire him to crack into two servers for you if hes a functionally illiterate fraud as snit has claimed many times.

Post by LegionX You claim to investigate bad guys - you've claimed you really reached out to Gremlin because he was a bad guy with the skills to support it. You've accused him many times of lying about becoming a grayhat instead of a blackhat by claiming a leopard doesn't change it's spots.

Are you now claiming that you wrongfully accused him of being a blackhat hacker? Didn't he help you get a laptop running that was able to use wifi from a single picture you shared of it? The same laptop you were told wouldn't do wifi by another so called professional?

Here's our question. Knowing what you do, personally about Gremlin - why do you remain silent when snit makes an accusation agaisnt him that you know for a fact is false? Is this what you think friends do for each other? They cannot use reason to show the message to be wrong so they try to feel somehow superior by attacking the messenger. They cling to their attacks and ignore the message time and time again. Post by Snit I would be happy if you went away, Gremlin. Do not click on any like which looks malicious in web sites.

If in mails they say any offer and you have so much cash do not respond to it. These are some point which can help you to keep your PC safe.

Share this: Twitter Facebook. Like this: Like Loading Previous Post Previous Post. Leave a Reply Cancel reply Enter your comment here To the contrary.

When my wallet is stolen, I can get my credit cards replaced within a few days; no real harm done. The cash in their wallet is gone for good. Two areas that are perhaps implied but might deserve more attention are the prevention of risk and the transfer of risk insurance or the like. This is actually a nice introduction to cybersecurity risk and is perhaps worded so as to be useful to non-security people, like boards of directors.

Only item I am seeing that is missing is the the desire to cause outages, panic, or other impact to the productivity or availability of a particular service a company provides. Possibly even used to unravel the confidence in a particular entity e. DNC Attack. Great article! I always enjoy your articles. I agree with what you say about organizations often doing the minimum required in order to meet compliance.

Security is making sure you lock it every day. My comment concerns definitions. Perhaps the definition of cybersecurity is too narrow if you are trying to sell the concept to a business. If cybersecurity included other aspects of protecting data from of from dangers, such as natural disasters, fires as well as hackers, perhaps the concept maybe more palatable to businesses.

For security to be effective you have to be able to measure the security risk to manage it. To date no security company offers this perspective. Security and Enterprise Risk Management will be harmonized, integrated to solve the complexities of Cybersecurity. Communication between the two professions is the first step.

Security professional have no understanding of the regulatory requirements for managing net profits, an organizations viability, from a operational risk, quantification of Cyber Risk or creation of a Cyber Risk Transfer Pricing Mechanism or Cyber Risk Capital Management perspective.

The Digital Risk Manager is just starting to be considered in the overall organizational structure. Once the full extent of the embedded options driving an organizations unique attack surface are understood, the extent of the infrastructure enhancements will be obvious. It is not possible to conduct business in most industries with the prevalence of so many capable, diverse, foes. You just failed to understand what you read. You will harass and you will troll and you will lie.

Remember, you are not owed. Michael Glasser. He was doing what he does. Ads be gone! This is a direct lie from you. He did no such thing. Stephen - fretwizzen. Dustic Cook the Fucntionally Illiterate Fraud.

Snit Michael Glasser. Kelly Phillips.



0コメント

  • 1000 / 1000