Do you think A.I can surpass human intelligence level?
Best posts made by XR7_
-
What you people think about A.I
-
EID MUBARAK ☪️️!!!
Got this picture in a WhatsApp forward, so yeah I forwarded here
For us it's tomorrow however T~T -
RE: What you people think about A.I
@AXES @AXES somehow I believe the biggest problem can be "machine learning", that thing can use the things learnt from us against us, but still it won't come near human intelligence level, that's what I believe.
-
RE: What you people think about A.I
@AXES I 100% agree, Facts
-
RE: "Keylogger 👾 ", your device may have this!
@AXES I really don't have idea about it, but I know something that's very very rarely used, all keys on our keyboard sounds(Audio signals) are different, I know this might sound weird but we don't feel it. There is a way ( it's called acoustic Keylogger) it just records the sound of keys pressed on our keyboard and after processing them it just sends it to them host/attacker.
- Check this GitHub repo for more information
https://github.com/shoyo/acoustic-keylogger
It's very rarely used. -
RE: Smartest programmer ever lived :(
@broken-soul sorry for your loss man.
-
RE: Smartest programmer ever lived :(
@AXES I definitely will try to find the movie and have a look. Thanks for the upvote brother.I'm just trying to keep the legacy alive
-
Microsoft signed a malicious driver!!!!! 👾
ROOTKITS
- Rootkit - is a software which is designed to enable the acess of a device to the unauthorized users.Somehow rootkits are malicious.
Recently Microsoft signed a Malicious driver named "Netfilter" which was targeting the gamers mostly.The also admitted of signing it and giving an assurance to give fresh driver updates that will remove the existing malicious driver.In this ,The host can acess everything in your computer without proper authentication/permission.
What signing actually means here-
- Signing a driver refers that the driver is verified/safe.
The Malicious driver was sending the data to a service center in China, refer the picture below to know more. (according to whois services)
Classification types (Virustotal)
Detected Malicious by these security services & more
To view a complete summary including hashes/detection visit Here
SIGNING INFORMATION :
Educational purposes only & there can be mistakes in this post ,please tell me them if you found any and I will definitely change it.
I don't know if anyone care or not. I just make these posts to get rid of boredom. Hit
Upvote
if you like it and please give more suggestion for new posts also ignore grammar mistakes:))
-
Malware probably your device have this!!!!
Malware
Malware : Malicious softwares are somehow most common way to get acess to any device,malware can access your microphone, shell of your device ( pictures and documents) , Camera, Call logs & sms, all the applications you use & your screen.
Major Types of malwares -
-
Traditional virus - A normal virus ( piece of code) that requires a host and victim. When this script is expected it damages ( mostly encrypts files) & more depends on the code.You can get these from pirated movies, pirated apps and usb.
-
Trojan horses - Trojan horses creates a payload between you and the host & can acess you whole device without authentication, mostly you can get this from Pirated Games, pirated applications & pirated movies & movies.
-
Adware - Somehow I personally don't consider this as virus, but it's still dangerous. It shows unwanted commercials & Popups on your device. It can also hijack your browser in some cases so your browsing history and cookies can be stolen.you will probably get this from pirated movies, games and applications too & Usb.
-
Spyware - Spyware somehow most dangerous and most useful one. Let's talk about positive side you can use spyware against the terrorists & can it's very useful for national security.
Now negative side, people can use these Spywares against anyone for this you need to open link and download things, and can get from pirated movies, games and applications. Spywares can acess your webcams, microphone, call logs & web cam and device shell. -
Worms - Worms are basically a virus that doesn't need any host, it just spread and spread .suppose your device got malware and you shared some files from your pc to another device then it can spread to another device too, their main goal is to multiply & encrypts all the files and make them Unacessable.You can get these from pirated games, movies, Links & Usb
-
Backdoor - Backdoor gives the host permission to acess your device and run all the remote command, the host can also update the Malware if needed. You can get this from same things I mentioned before.
So somehow, pirated games & Generators are biggest baits. Kind of those pop-up ads too.
EDUCATIONAL PURPOSES ONLY
I don't know if anyone care or not, I just makes these posts to get rid of boredom, ignore grammar mistakes too
You can also join our discord we have these type of debates there & we got cool custom developed bots
:))
-
-
RE: Mental health, dreams and fantasies. Two personalities boyish and feminine
@findingmyself As you mentioned about Your "Therapist", I personally believe you should tell them that, there is no shame & it won't sound weird to them, just have some courage and tell them that(I'm sure they are more experienced/Expert than people here) Hope they help you, I. Hope you gets well soon, stay healthy.
:))
-
RE: Phishing attack ( most common way to get credentials from target/victim)
@KaViNdU just ask anything if you want brother : )
-
RE: Smartest programmer ever lived :(
@broken-soul I'm really sorry for your mom,how she's doing nowadays?
-
RE: Phishing attack ( most common way to get credentials from target/victim)
@broken-soul just trying to find way to make people aware : )
-
RE: DDOS ATTACKS!!!!!
@AXES usually they continuesly send requests using bot ip and and when the server reaches the maximum number of request then, boom. It stops working
-
RE: DDOS ATTACKS!!!!!
@AXES probably they were script kiddies doing that for some Adrenaline rush
-
RE: Phishing attack ( most common way to get credentials from target/victim)
@broken-soul yes there is but I will tell you the" legal ways", you can use phone OSInt tools, actually these OSInt tools search the query in the websites and services ( it just gives the information that's public) and if you have the target's phone number you can look up in into any "mobile number" search websites, it won't give you the correct adress, it would give you the country and state where the number was authorized/registered & if somehow if the victim is really dumb you may find information in "Truecaller application" that's available on play store
Use this for :
EDUCATIONAL PURPOSES ONLY.