Thursday, October 29, 2009

how to become a hacker

In this post i will share with you my experience on hacking and cracking, and will tell you steps you need to take to become a professional hacker.Become a hacker [ ] Get Unbeliveable++ with hacks [ ] Get Unbeliveable++ legit [ ] Become a staff member [ ] Learn how to make hacks [ ] Get me Habamon out of the Egg! [ ] Respect List [MPGH]Gourav2122 [MPGH]Dave84311 [MPGH]arunforce ...To become a professional hacker, it is not required to have a postgraduate certificate in ethical hacking or a computer science degree. Matt Moore, the security assessments manager at Oracle says people from any background could succeed ...Every day I get a lot of emails where people ask me- How to Become a Hacker?. In fact this question is not easy to answer because, hacking is not an art that can be mastered overnight. It requires knowledge, skills, creativity, ...Typically, the multinationals and SMEs employ the ethical hackers to find out the flaws in their IT networks as well as software and security. To become a professional hacker, it is not required to have a postgraduate certificate in ...How to become a hacker. 2009/08/11. How to become a hacker by Girish Venkatachalam. Girish Venkatachalam is a UNIX hacker with more than a decade of networking and crypto programming experience. His hobbies include yoga,cycling, ...In this second lesson of our How to Become an Hacker we deal about the most important targets than Hackers have and why they have this targets in their.The idea being, if you know how to exploit a website for instance, then you can go and secure your website, and help others in s; How to become a Hacker A detailed analysis of what you need to be a Hacking and Security Expert ...How To Become A Hacker. What do you think hacking is? If you think that it is breaking into someone else's computer, then you are absolutely WRONG. If you think it is all about Security, then you have the imagination which is as not ...To become an Hacker or Programmer it is essencial to think abstract. In your way from Programmer you resolve different problems. If you fix this you are an Hacker. [23:32:54] <|saigkill|> The Movies about Hackers are not real. ...
I was under the impression my phone was being tapped by activating the mic. I run a business and I talk about very important business info so I need to understand how this stuff works. When it first started I would get spoofed emails to my blackberry, with headings denoting what I said in the last conversation on a daily basis. For example I was in the car talking about the roman god misra and my friend Quinn, and then got a spoofed email from Misra Quinn. At first I didn't tell anyone and would just unplug my battery. Recently I found out my suspicions were right. There is a cell phone spy program for 100$ called Flexispy that allows someone who has that software installed in a smart phone to call your phone and either tap your calls or remotely activate your speaker while your phone apears off. I read that they send the program to your phone in a hidden text, and that it remains invisible. Once activated your phone becomes a walking bug. How does it work? Why doesn't the number they call from daily to activate the software show up on your phone bill? Why do the hours that they listen to you not show up on your phone bill as a call, considering they have a line open? Does the program in thier phone hack directly into my phone, or does it hijack some phone company server in between my phone and the hackers phone? Tell me everything you know. I am sure many other people all over the world could benefit from understanding the technichallity of this nasty spy program. I hope one day it is illegal to produce or posess such a program. I am not one for strict laws but this is sick, and could be dangerous. Also is there any way to catch the scumbag doing this?


ON THE INTERNET. AND HOW DO YOU DESGUES YOURSELF SO HACKERS CANT FIND YOU. MOST OFF ALL HOW DO HACKERS FIND YOU AND GET INTO YOUR COMPUTER.

I AM NOT ASKING SO I CAN HACK SOMEONE. I ONLY WANT TO KNOW HOW HACKER HACK SO I CAN FIGURE OUT HOW TO BETTER PROTECT ME NETWORK AND WEB SITE.

ALL I NEED IS ALINK OR DESCRIPTION ON HACKING TECHNIQUES SO I CAN FIGURE OUT A DEFENSE. I WAS SUGESTED HACKING EXPOSED. BUT HAVENT LOOKED IT UP YET.


can someone email me the file (by the way my email is roxas151@gmail.com) anyways ive always wanted to become a hacker and so has my friend. i just want to know how to moon jump then ill be fine promise anyways can someone email me the files. THIS IS ONLY FOR MARIO KART WII HACKERS


well im just asking ..
can any one tell me some stuff?


Sorry I blocked you Warrior Poo Flinger, it became evident something evil was afoot.

I think we should flog the hackers, as a very wise Owl once mentioned.


10-22-09 cont'd; Do NOT use the VERIFICATION LINKS FROM EMAIL CO's or anyone, as theCOPY LOOKS Identical to the Original! They got my 2nd & 3rd P/W. Stole AOL, You Tube, & tampered with 2 YAHOO accts, by Altering,Deleting,& would NOT let Email be sent or saved. Microsoft did NOT detect them on a Full System Scan for 2 hrs! Nor did NORTON Security! They gave me an FBI code to track them. Most are overseas & R kids,BUT 'INTERPOLE' has jurisdiction. Several Been hacked@you tube. I called their bluff...& publicly posted @every site I could...that I'm good at what I do..& if I track them..I'll ring your doorbell & behind me will br the F.B.I. & have them arrested & prosecuted! (UNLESS they R overseas) They had Spyware & a virus By a 'RemoteAccess' on My NEW laptop. They could see 'Everything I was typing & every site I went to.' DO NOT save any info to a flashdrive,CD-R, DVD as if U have been fully infected, U will 'RE-infect your computer if you use any SAVED devices. Also WiFi & LAN, Microsoft Security said is 1 of their BIGGEST THREATS. Keep computer
'Corded or wired' (i.e. Verizon, Time Warner CBL)U still can get HACKED, even if U are
wired & not on a laptop with WiFi Or LAN! It is absolutely outrageous what is going on. 1 of their tricks in a virus...is the
'ARROW/pointer key' that is normally
'Steady'..becomes 'Fluttering & moving around like a Butterfly.' I learned ALL of this on my own & the help guides on-line. ALSO By demanding to speak with 'Security'& NOT
'Customer Service' Or 'On-line Chats.'For me
were USELESS! In the Phillipines. They also have NEW FAKE SECURITY software. It looks similar, might be cheaper, BUT these sick preyors,HAVE a CD with an INFECTION on It. It's their sick demented world. But it's
'Cybercrime',Fraud,& a Host of others..& it's NOT JAIL;IT's FEDERAL..& when sentenced go to a Federal Prison!That is 'just desserts'.
That my friend is CHECKMATE!


i heard that there is an EC-council that offers courses that will help you become ethical hacker certified, but it sounds like one big scam.

i want to be able to use my gifts for computers in a good way. i am pretty good at hacking, but i am new to it because of mom's security stuff on vista i haven't been able to look that stuff up until recently.

i want to learn more about it. I want to do it as a job and still be legit. so please help!!!!!!!!
i'm already taking an AP Computer Science class and its pretty easy.
but we're just working with Dr. Java and javabat.com


how do i become.. an ethical hacker?.what are basic knowledge i need to develop?. suggest
any books or websites are teach that.Give me more details about it...


how do i become.. an ethical hacker?.what are basic knowledge i need to develop?. suggest
any books or websites are teach that.Give me more details about it...


how do i become.. an ethical hacker?.what are basic knowledge i need to develop?. suggest
any books or websites are teach that.Give me more details about it...


I am using Windows Vista Home Premium, 64 bit. If there's any other information you need just ask...

I am trying to rotate a photo in one of my picture files. Something I hav done hundreds upon hundreds of times. I am doing it by right clicking and asking it to rotate that way. But when I do it now it is telling me that the fie is in use or is read only. I went to check the "properties" of the file, and it is indeed marked as "read only". I then went all the way back to the "user" file, and found that the whole of my folder "pictures" was marked as "read only". Of course I un-clicked the box and told it to perform the action on all sub-folders. It went through the motions and said it was all done. When I checked again, it was checked as "read only" again!

What is going on?

As usual, as soon as anything strange starts to happen on my computer I instantly think "hacker" (despite having an up-to-date virus program), so I went to prompt and used netstat -a to check if there were any unusual activity, and there wasn't.

The only thing I have done today that is a little out of the ordinary is do a "disk clean-up". I just followed the directions in he "disk clean-up" program in system tools. Nothing extraordinary...

Can anyone help me?


What are my college steps into becoming an ethical hacker? I, so far have applied to come colleges and in their I declared my major as Computer Science and Criminal Justice. I will be double majoring. Right step?


What are some of the degrees i should major on in order to become an ethical hacker? Should it be computer science?


I know it's a stupid question, I just worded it that way because I knew you would click on it.

Anyway... I've had an interest in computers for a long time and I understand that to actually be a hacker I have to be interested and dedicated. I also know that it will be very time consuming, which is fine since I don't have a life anyway. I'm not trying to become a hacker just to piss people off or be an online "gangster"... I want to learn because if I don't get a job involving computers/networking etc, most employers will prefer someone who has a good knowledge of computers, and it would be good to have a head start (I'm likely going to major in computer science).

So anyway, what direction should I take to become a white hat hacker? What programming languages should I learn? In what order should I learn those? Finally, are there any websites with friendly and helpful people there to answer your questions? Yahoo answers seems to have too many uh, less "mature" people...

Thanks, 10 points to the best answer.
-Frerebo


I am interested in learning white hat hacking and would like to become an ethical hacker.

Please suggest any good forums or website where I can learn (for free).

I know C and C++ and am doing Computer Engineering degree course.

Cheers.


Basically, awhile back (about 3 weeks ago) I had a dream where I was observing from the third person, my brother and his friend playing a game. And then all of a sudden, someone's score on the game started increasing extremely fast, and they were both like "hacker!" and then were saying to each other how they would report him, and were laughing, and then a beeping started and grew in volume, until all I heard was the beeping, and then time started to slow down, and my entire conception of time moving forward was being stripped away, and I was trying to resist, and then I felt time slow down more and more, and I felt super heavy and felt like I was falling out of time. And it felt basically like since time was becoming slower, I would eventually be frozen in time, but I panicked and woke up. Felt super out of it that day, and somewhat dead inside. Then that night (since that was a nap) I had a dream that I was driving a car, and drove it off a cliff, and it seemed to happen again, but I broke out of it quicker since I was afraid of it getting more intense. It stopped for awhile after that but just last night I had a similar dream, except I saw myself from a third person acting stupid, and then woke up and saw myself standing in the kitchen, but after I put on my glasses I realized it was just a collection of cans, etc. Anyone have any idea?


They had been expecting a war, worse, a terror plot. Instead of fleding inside like everyone had did, I had joined the others, and played my new role. A spie.
I had become one of the most important people here. My job was simple, a computer hacker. I had traced all kinds of records, and could change them easily. My partner was Seth Halloway, a scientist. Rumor is thathe were creating a destructive machine. I hadn't known what it would be for, but realized it was a key to destruction.

My journal was sitting on my bed, with everything written in it. I picked it up and skimmed through last newspaper's writings I taped in there.
"A TAKE OVER?" blazed the header on the first page.
NEWS HAVE BEEN REPORTED OF GOVERNMENT TAKE OVER IN THE WHITE HOUSE. NEWLY ELECTED CHIEF TREY WESLY SAYS THAT THEY ARE ADDING NEW MEMBERS SUCH AS LAVINA ADKINS, NEW COMPUTER SPECIALIST, AND MORE OTHERS TO THEIR "NEWLY GOVERNMENT". "RUMORS OF HOLDING TERROR PLOTS HERE IS FAKE," SAYS SETH HALLOWAY, NEW SCIENTIST THERE. MR. WESLY HAS BEEN QUESTIONED MANY TIMES IN DC AND STILL NO SIGN OF "RUMORED TERROR PLOTS". HE WILL BE DOING ANOTHER ANNOUCEMENT OCTOBER 26. THERE HAVE BEEN SUDDEN ARRESTS FOR SOME OF THE GOVERNMENT OFFICIALS. KLYDE METZ WILL BE HOLD FOR-
The page had been ripped there, with dashes of wet streaks around the edges. It had been fetched out of the rain earlier yesterday.
I turned it back a couple of pages to the new government official. It had been printed off the computer yesterday as a small headliner.
NEWLY ELECTED GOVERNMENT
MANY GOVERNMENT OFFICALS HAVE BEEN EXILED DUE TO UNKNOWN CHANGES. NEW HEAD CHIEF TREY WESLEY, FOLLWING FIFTY OTHERS HAVE JOINED. THERE NAMES HAVE BEEN POSTED HERE, WITH THE EXCEPTION OF ONE OTHER, FOUND OUT OF BEING A SPIE. THE TOP OFFICIALS HAVE BEEN POSTED BELOW;
TREY WESLEY: THE NEW CHIEF IN CHARGE OF THE GOVERNMENT FROM NYC.
LAVINA ADKINS: THE TOP SPECIALIST OF COMPUTERS FROM CALIFORNIA. SHE HAS BEEN NOMINATED FOR THETHIRD HOLDER OF THE NAME "TOP OFFICIAL"
SETH HALLOWAY: THE NEW SCIENTIST WHO HOLDS THE NAME "FOURTH TOP OFFICIAL"
TRISTAN TAYLOR: THE SECOND IN COMMAND. HIS EXPERIENCE HOLDS AS THE BOSS IN POLITICS.
The page had ended after that. It had been from a government website newspaper headline.
I shoved my journal in my desk, almost tripping over my long pink dress. No matter how much I could complain, I was required to dress with "class".
My parents found that "Government Politics", weren't for girls, so they secretly snatched anything "Government."
I was from a well known rich family called the Checas. Our house was an old mansion tuked away from New York City, hidden in the backstreets.My name was Callinda,a purely uncommon name here. I called myself Callie, a better way of that horrid name.
My older sister was statuesque, and appealing. Even her name was. Bianca Checa sounded like a movie star's name. She was flawless at everything; her handwriting was better than mothers. Even her speech was delicate.
I on the other-hand had hand-writing worse than the maid. My speech was very limited, not flawless like Bianca's.
We were treated very grandly, and always weared fancy dresses with hairbows. on occasion skirts. I had never worn a pair of jeans in my life. We were tutored at our house in music, eduacation, and penmanship. I loathed penminship most of all. My writing just wasn't fancy and curvy, and still my parents were worried. They hired more and more tutors for me, no matter how much I insisted not to. They ignored me.
"CALLINDA!" I heard the maid scream from downstairs. "GET OVER HERE!"
Best not to ignore them, because soon after they would tell mother. I bolted down the stairs, tripping on my dress again and smashing onto the red carpeted stairs.
Bianca was sitting the parlor, reading a novel.
"Dear Callinda, are you well?" she asked royally, putting down her book.
I got up, covered in bruises on my legs. The hem in my dress had ripped and hanged loosely.
"Yes," I squeaked painfully.
The maid had come out of the dining room to me.
"Callinda! You are in so much trouble!" she giggled darkly.
I flushed dark red, all over my pale chalky face. It almost looked like blood. "I'm well Mistress Audra," I curtsied politely, ignoring the throbbing pain in my right leg.
Mistress Audra smiled unpleasantly. "Your apologies are welcome Miss Callinda. Please next time don't spill the vase all over the new tablecloth."
She walked away, with her nose in the air. I could imagine how much humor it gave to torture me.
Bianca stood up from the armchair. "Best to see the seamstress before mother finds out," she said.
I nodded. Then turned to her room and stalked out angry.

Is this good so far? Leave a comment please! I'm eleven years old and I wrote this. Am I good?


i just wanted to see what you guys thought of my persuasive essay. its on internet censorship. Anything you think im missing? or something i could add? anything would be very helpful. thank you soo much!

------------------------------------------------------------------------------------------------------

Do you want our future generations being exposed to violence, hate, sex, illegal substances, and false information, and then one day think it would be cool or alright to try these things? The internet is filled with dangerous information, that children should never have the freedom to access. Children learn from example, and if they search, watch, or read something on the web that could be potentially dangerous, they could be influenced or curious and think that it would be alright to imitate one day. If our children now are viewing these things, it could mean that are future generations can grow to be more violent and our world could become more dangerous than it already is today. Censorship is necessary if we plan on having our kids grow up in the safest environment possible.

The internet is a wonderful learning tool. Of course like any good thing, the Internet comes with its ups and downs. There are several things that arena��t suitable for any child on the internet, such as pornography, violent material, adult chat rooms, and racist or hateful sites, there are even web sites about cheating in schools. Most of us agree that children should be protected from things that aren't appropriate, and Ia��m sure you to agree that the internet would be a nicer place without all of this negative information.

Everyone in the world has access to the World Wide Web, including predators. A predator can be a terrible hacker out there sending viruses to your computer, trying to steal your identity, and your credit card numbers. Or in worse case scenarios predators could be a potential rapist, preying on young children over chat rooms. Children are innocent, and wouldna��t normally assume the potential danger online chat rooms have. Even though our system has taken steps to insure these terrible things dona��t happen, kids still find ways to get around it by lying about there age or sneaking behind there parents backs. We have all been raised not to talk to strangers; just because they are hidden behind a computer screen does not make it any less dangerous.

On the web you can find just about anything youa��re looking for and some of these things include sites about drugs and alcohol and sites with sexual content. Half of the content available online, is not for kids, buts still most of these sites are being accessed by kids. The internet is made up of many different sites that were created by adults for adults, most of these are pornographic sites. Did you know 83% of the images available on the Internet are pornographic? In some cases pornography can be addicting. Can you imagine a ten year-old innocently surfing the Internet and suddenly bump into a pornographic site depicting explicit images of naked women and becoming addicted to it? This is just one of the many worst case scenarios our online world holds. Our internet also holds knowledge about bombs, and drugs and how you can create them. The internet not being censored gives a child complete accsess to try these things.

Many people think the Internet should be censored because it gives underage surfers open access to undesirable material. Most of our parents are good and try to keep us safe from the harmful ways of the World Wide Web, but The truth of the matter is most of our parents are not computer savvy whatsoever, and kids are fully aware whats available to them online, and they know how to access it with ease. It is obvious that just warning them about whata��s online is a thing of the past, and that parents taking action is becoming less and less effective. It has become clear that it is up to the government to protect our young minds from corruption. Censorship will continue to be a widely debated and highly controversial subject in American culture, but It is vital now more than ever to stop these sites, and keep our kids safe. Think about all of the terrible people out there; an uncensored internet gives them an easier way to harm and exploit innocent people.


what all languages should i learn??? (like php sql java javascript)





-.-


I know my question may raise ethical cyber law issues but i'm just intrigued.

Without regarding whatsoever laws, whether real world or cyber world laws, is it really possible to become rich in a matter of short time through computer hacking alone??

Also, what's the easiest and fastest way to be a "master hacker"?





1-) hacker send me a virus that can open ports
2-) While Sending me that Virus i transferred my private files to flash drive
3-) He told me to contact him in yahoo
4-) i contact him in yahoo
5-) HE gives me a program he claims it gets red of a virus
6-) that program appears as another virus but the hacker tells me it will soulve my problem and the virus alert is false
7-) Next He Sends me a virus Distructor via Security shell tunner to my computer but luckly my Windows Secuirty Blocks the File
8-) the next day he admits that all of that are viruses , 1 that open ports and another one that takes my password
9-) he becomes my Friend after
10-) I ask him if he stole any of my pictures and if I am still infected
11-) He says he never stole any files and he says that i am not infected any more. he says his intentions was not to steal my files but to contact me and be my friend and give me advice about the forums.

Can some one tell me if he is telling the truth? he is being friendly to me thought.
Another thing , Can some one tell me if he can steal my files using Security shell tunnel?

Also just if you want can some one contact me at
Sonic2036@yahoo.com i am desperate please
i don't want any pictures of me photoshopped.
PLEASE SOME ONE HELP ME
WHY NO ONE WANTS TO ANSWER MY QUESTION. I Need help serious help


I am Egyptian so since 2 days i figured that my msn email got stolen so i googled my email and i found that a hacker in an arabic forum hacked a bunch of random emails then he list all of them including mine along with their passwords so i wanted to know why do hackers do such useless things like this?? is it to become popular?? is it coz they have some kind of psycological disease i can retrieve it if i want but i wanna know why they do that???


Do you have to become a hacker ?


Okay so i have to write a poem about John Rolfe.
I have the facts already in order, i just need them to be re-wored.
I also have the first 5 lines started.
Just please make it as long as possible.
I'll take anything!!!
Best Answer for the person with the most lines!!!

John Rolfe Poem

Here are the facts in order.

1 Born in Norfolk, England, 1585 (baptized May 6, 1585)
2 Married first wife, Sara Hacker Rolfe
3 Left in June to go to Virginia with his wife
4 The ship they went on was called the Sea Adventure
5 The ship wrecked on the Bermuda's and passengers were stranded there for many months
6 While there, John and Sara had a daughter, Bermuda, who died shortly after birth
7 They finally escaped the island and were Virginia bound
8 Wife died once they landed in Virginia
9 Colonists tried to make profit from silk making, glass making, lumber, sassafras, pitch and tar, and soap ashes
10 John Discovered tobacco and it became the first profitable crop on the mainland
11 From then on, he was a planter/farmer/agriculturalist
12 He met Pocahontas, daughter of Chief Powhatan, and fell in love
13 She was brought to Jamestown as a captive
14 They married in 1614 with permission from the chief
15 Peace between the Indians and Colonists was kept for 8 years bc of the marriage
16 He took a break from farming and was secretary and recorder for the colony for a short time
17 In 1621 he was appointed to the Council of State
18 He and Pocahontas had a son named Thomas
19 All three left to return to England where Pocahontas died 7 months after arrival
20 John left his son in England with a guardian and returned to Virginia
21 He married again to Jane Pierce, daughter of a colonist
22 Bermuda Hundred Community, where John and Jane lived, was wiped out in a battle with the Indians. This is where he seems to have met his death.


I have started and here is what i have so far, you can do whatever you want to with it. lol


1 John Rolfe was born in Norfolk, England
2 It was nice, but not quite his dreamland
3 He met and married Sara Hacker Rolfe
4 Soon after marriage, they boarded a ship and were off
5 They left for Virginia in the month on June


What course should i take to become a programmer or a hacker?
I need to choose for my further study on programming but i don't know which course should i take to become a programmer or a hacker.
Software Engineering or Computer Science.
Please give me some of the information too.

Thanks,
Max


I'm thinking something malicious. Okay, my internet speed has become significantly slower. Sometimes pages just will not load for minutes at a time (when they usually took seconds) but other pages load as normal. I don't understand why but I'm thinking that someone may be interfering with my PC (as in a hacker or perhaps some malware).

I've run my anti-virus and firewall but still not solution. I haven't installed any new software or changed any settings.


i don't wanna be a hacker, but i love computers and have interest in programming (but i have no clue or knowledge in it) but im majoring in graphic design :( bcz i don't like math , i can be gd at it but i don't have passion in it, so although i wanted to major in computer science or computer engineering, because i have high interest in technology and how it all works from A to Z
and my highest interest is to know how hacking is done!! i don't plan to hack anyone but im really interested in knowing how to do it.
do i have to be a computer science student or know all kinds of commands and how they are used from the very beginning to be able to hack? or can it be learned and discovered during the process?

thanks :)


Professional Computer Hacker?
so many great ideas, thanks guys!! yes, my dream is to become an ethical hacker and an unethical hacker so I can get money from my eneimies bank accounts and become rich.../out getting caught.


I've learned some javascript. I heard hackers can use it to hack your computer. I could definitely see how they can make viruses and stuff. Don't worry, I won't become one of them.
Actually I think a better word would be virus makers.


hey guys i need to be a hacker and i need to know how i can be so please tell me how i can be?


Sorry for the long story.

I've lived with my grandparents since 15 and I've been working since 19. Since around that age, I started going through hell on earth. I started being verbally abused by my grandmother. As a teenager, I stayed quiet whenever she would talk about my father or someone and I knew it wasn't true. Now as an adult with my own say, she would yell at me for disagreeing and becomes hostile. I don't like to be told things about anyone that are not true...much less every single day, so I would get upset. My father is a Christian and he's not perfect, but he's not the person she says he is. She's always wanted me to hate him, it seems. I don't defend him, but I tell her that what she is saying is not true. She thinks I'm defending him and betraying her.

Other major discussions are about accusations of things I don't do. Such things include me working with her cell phone so that she cannot make or receive calls, listening to her phone conversations (I know how to use the internet and computers, but I'm not a hacker). She would lock her room because she distrusts me entering there even though I've never done anything. I would understand if she did that always, but when my uncle (who is 43 and still lives with her and doesn't pay rent) stays there alone, she doesn't do it. She doesn't want me to go close to the family dog because she thinks I would do harm to him. I also have wireless internet which my uncle uses, and so whenever the internet doesn't work he tells her that I'm blocking the internet on his computer. She accuses me of being jealous of him because I've mentioned that I'm not being treated fairly compared to him. He's been arrested before, so I don't know why she defends him. She thinks I have an evil mind and I do all these things to harm her. I consider myself an honest and respectful guy who is fearful of God. I've always helped them with different things regarding their credit, finances, finding the best deals on things they wanted to buy, money lending, etc and I'm not thanked for it.

I was told to move out 2 years ago, so I complied with that. After a year away from them and not communicating, I had a situation at work that caused me an emotional breakdown. I was diagnosed with depression and anxiety. At that point I just couldn't find support in anyone, so I just decided to give them a visit. She seemed happy when she saw me and I was impressed. She almost seemed like a totally different person. A few days after, without me asking for it, she invited me to come back to her home paying $300 for rent. I accepted this thinking that everything was going to be different. Well, that was a year ago and since earlier this year we're back to the same situation (or worse).

I don't talk to them anymore since I feel betrayed even by my grandfather who never defends me or at least tells her to stop accusing me. He believes everything she says. My uncles, aunts, and even my mother don't support me and say I should respect what she says. She always tells them things about me, so that's why they're on her side. She's very influential on her family, so nobody has the guts to tell her when she's being abusive. I think they are fearful of her. It seems that what bothers her so much about me is that I don't stay quiet when she argues. I understand she's my grandmother, but what should I do? What would you do? Am I doing something wrong by answering back? BTW, I don't use curse words, I just tell her what I know is right. She's always talking about me to my family and I've found that out through communication with them. I feel miserable.

I'm 24 now and I've been told to move out again. That is fine with me...as a matter of fact I love the idea even if I have to pay more in bills and rent. My only hope is God, but I also feel I need human support which I don't seem to have. I need any advice please. I know many will say counseling, but I would like more than that. I want to have my family understand me, support me and believe in me. I don't want everyone against me. I appreciate your responses. Thank you.
Thanks for the advice. However, as I said, I already had experience being on my own and was doing well financially. She was the one that asked me to come back. I did because she cried over it one day. She seems to have a double-personality. Also, the one year I was out of the house was not enough for a change in her. And BTW, 24 is not necessarily a year you have to be out of your house. 24, although an adult, does not look bad, especially when I'm still studying. 30 and then you're talking.
KCelleste, you don't have to be insulting, especially during this time of my life. I have experience living by myself and the problem is NOT me moving out (I think I've said this a few times), the problem is I'm trying to fix the relationship among the ones involved. I definitely agree that being somewhere else is better than dealing with this, but I love my family and I don't want to keep the relationship in a bad state! And I don't do anything wrong, the only thing I do is that I don't stay quiet when I'm accused and I talk back! That's all I do and because of that I'm being judged? My uncle has had special preference from her and everyone in the family knows that, and again he's 43! And I don't strangle anyone. I'm not that kind of person. I'VE NEVER even thought of doing any harm to anyone, not even tempted, so don't accuse me. I don't think I need to take this kind of judgment from you. Next time when you answer someone's question, try to be less judgmental.


people online psn alway tell me they are sony reps and search for hackers/cheaters online so they can ban them? im not sure if they are lying about being a rep? but i think that would be A BADA$$ job to play cod4 all day?? lol

how would you become one of these?


I have just down loaded the above app for my iphone, however it doesn't do half the stuff it supposed to. and in order to open a dwg, you have to open a FTP server on the net, which then becomes venerable to hackers.
Why does iTunes not check such apps and how can unsatisfied customers get there wasted money back??


Well I met this hacker a few months ago that persuaded me to let him be my Tech support on forums i do. Everything was fine till he met my friend and learned how me and my friend argue so much...well then our forums started becoming "Nonexistent" no big deal but now he is using my IP to spoof mail people I know and such :/ It is becoming increasingly annoying and I wanted to know if there is anything I could do to stop it?


Friends, am a hindu guy unhappily married with a 6 yr old.
Due to various reasons my marital life had gone sour and all my efforts went in vain because my partner felt she has chosen a wrong partner.Once that feelings sets in how much ever anyone tries its futile.
Only the birth of my little one has held our wedolck till now, although we live like paying guests in our house. most of the time the little one spend shis time at his grandparents so that he doesnt get disturbed by his parents. I take financial care of both of them and even now never say no to whatever their wants and demands are, although my physical presence is minimal with them.
With all these things in my life i met a collegue of mine in an away state (from where partner and son live). she is a muslim and of sam age as mine. She had then recently went into her marriage turmoil which ended in a divorce after 8 years. she was also clearly unhappy and in same state of mind as me.
We met and gradually our friendship deepened. after quite some time, i realized she was the kinda girl i was looking for and ultimately leaving all my embarassment and fear, proposed to her. she also accepted my love and we were quiet happy for almost 2 years, although for society and her family we were good friends.we had become one mentally, emotionally and physically.Although we were quite close physically too, i had always restrained myself from doing what only a husband and wife ultimately should enjoy. Because i vowed and assured that after marriage we would anyways enjoy all those things as a legal partners.i was close to their family who took special concern for me while i stayed alone there.
we both even decided we would get married and per her wish, i would convert to islam and leave my past behind (divorcing the otherwise non-existent wife). i was ready for that too and knowing very well , i would be left with no support of my family, friends and anyone, my entire thoughts were the rest of my life with her. due to this i had already spoken with my people also about this and hinted my legal partner too.
Then my girl went out of country for furthering her studies and because she believed our country was not kind to a divorcee. i tried my level best to go there without any support from anyone for next 6 months.
Then her contacts reduced and she changed. all the loving words and passionate exchanges missed in her mails and calls. then after an year she finally told me that she doesnt want to hurt her parents, doesnt want to disturb my family life ( even knowing very well how i was living an non-existent life) and then she started to look out for other guys. then through some unknown group of people who had somehow hacked through into her emails and sent regular mails to me, i got to know that she was in touch with many guys through chatting (webcam chats were maximum), calls, etc and maybe few in person too.
I was shocked. initially i had felt it was some mischief by someone who has some bad intention for her. then on me further prodging her, she tells me to mind my life and allow her to live hers as the way she wants. she was back home an year ago and after that too she never told she was here unless or until i came to know of it by chance.
Now the hackers group had mailed me that they had informed her family and many others as well about her seemingly bad character and they also warned me that they woudl harm her and me if i continue to love her or contact her.
When i did call her about this, she was very rude and caustic to me and after few days changed her contact number, mail id and had gone to the extent of i think telling her people also not to let me know of any of her details.
I had been living mentally as her husband since the last 4 years (including the time i spent with her too) and still living only with her memories and our past as my life. i Still consider her my wife and am ready to live with her as so, even if its the last day of my life. I love her the most in my life and ready to go any extent to get her to me.
At the same time i dont want any force and want her to love me for how much i love her and understand and come to me.
I cant quite understand why she has left me and interested in other guys when all i thought a girl wanted was someone to love genuinely and selflessly? because of these my career had taken a strong beating and since my legal partner is earning handsomely she is quite happy with her life too. i have lost everything-my parents, brothers, sisters and relatives, friends. i have changed myself to her liking which is the way she wanted me to be so much that now am unable to get back to my old self. Due to my disregard of the religion i was born with and trying to mould to islam, many see me as a villian too.
Why did she do this to me? I know for sure that she did love me so very much and i swear there would be none who would also love me as equal to the way i did. How could she so easily forget me and all our lov


coures, or Subject & other things


So, I have two youtube accounts, one of which i do not use anymore and someone hacked it, changed the password, and the email. They have been sending me messages so I blocked them but they can still reply to comments that I have been posting on other videos. Then, he posted my email on the channel for everyone to see. I think it might be this dude w/ a channel named projectstrength bc the hacker became friends with him and the hacker said he would delete the account if i didnt record myself singing thriller (but he was bluffing bc i never did) and projectstrengh is obsessed w/ michael jackson. So what should I do? I have no idea how to report hackers to youtube
no, really? i just said that, but that doesnt get the dude off of my account or stop replying to my comments. I JUST WANT MY ACCOUNT BACK
I know it's not my friend because the only one that knows how to work a youtube is a really bad speller and this dude is really good at spelling. and he audioswapped my old vid w/ rap and my friend does not own any rap. and he would not post my email for everyone to see


hye... i am currently studying in B.Tech (Information Technology).. i am interested in some of the hacking techniques and got impressed on hackers... i don't want to use the knowledge in wrong way like cracking... Is there any higher degree for this...? How can i proceed ..?


Being a hacker also


I want to become a hacker and I am now currently attending the IDCS (International Diploma in Computer Studies) and first year student of UCSY (University of Computer Studies Yangon). The main problem is that in the second year of UCSY I have to choose the hardware or software as my career. What should I choose? I am really interested in hacker work, cracking work and network security. I think if I take software as my career, I have to learn Operating System, Database Management, Java Script, etc... but if I take hardware, I have to learn about computer circuit, some of network like TCP/IP etc.. Can anyone help me to choose my career? I really want to become a hacker, cracker or something about network security... Thanks so much...


not that i necessarily want to be one i just want to know like....what do you need to know in order to hack like a website or something? i know this is a pretty "low" question but i really am curious. just tell me anything about hacking, how it's done, etc.


ok so mi doing this project and i have to research all the actors and famous actresses that just became famous through like agents or auditioning..but heres the catch they are not alowed to have been in plays or taken acting classes they basically had to have just auditioned or gotten an agent..hackers and anyone please help me do this research..i appreciate it so much..this might seem like alot but u will get 20 points..please help!!??
thanx
and also they cant really have performed at all..like johnny depp played guitar for audiences and he knew nicolas cage..and brad pitt moved to LA and took some acting classes..see this is hard..thanx again though


this always comes in my dream,
I dream that my brain is hacked, via electricity in the brain tru nano bot sending my brain data to satelite and they controlling my brain. etc.
This was become a thinking cap for me some days ago, but its a dream, but I still fears - not know why.
My question is about those hackers, how much they are powerfull?
in dreams i see them monsters and devils - but they are human who hack other human's brain.
do they know more then we ? they now not humans but something else ?
what do you think? if some humans have this power, what they can do?


Recently I've started experiencing problems with a Yahoo! mail account that I use almost exclusively for job searching. Whenever I try to reply to messages that I receive in that account, I get the verification screen with a code to key in. I key in that code correctly, but it still does not allow the reply to be sent.

This has become a huge problem as the emails I receive at this account are for job searching and I need this email account to work immediately - but for some reason there is some "suspicious activity" that Yahoo! is apparently detecting and they've set this verification process on my account that I can't get past.

I can't reply to emails and occasionally I can't even send emails because of this verification screen. I key in the code on the screen correctly and I still can't get past it.

I've submitted 4 requests for help from Yahoo! email support with no reply yet. I've noticed some difference in how this problem occurs in Mozilla Firefox and Google Chrome, but I can't nail down why or what the difference is.

Has some hacker gained access to my account and using it inappropriately? What is the "suspicious activity" that Yahoo! is detecting? How can I get help to clear this up?

1 comment:

  1. No body knows it all but in the case of spyexpert0@gmail.com i can bet with my life that this hacker knows it all. with the services spyexpert0@gmail.com rendered to me (Phone hack) i will choose this hacker 1 million times over another. Thank you spyexpert0@gmail.com for being  real to me and to all your client you have worked for God bless you always.

    ReplyDelete