-
Arran
:
- BILLYBIGBOLLOCKS : silence jew
- DangerousBlackGuy : Donkey kong is a racist game for simpletons and coons
- 64
- 85
https://rdrama.net/post/338842/diddykongdancediddykongscaredkongmaxxing-event-badges-galore-return-of
!badgemaxxers refer to above thread
Also a sneak peek of something
Also if I can figure out how to stream from the steamdeck would you guys watch me play donkey kong
I'm not very good
There would be no voice or camera or anything literally just dkc2
- 72
- 64
I completely misremembered the Bill T-shirt joke and now I'm a day off
NFL had their little award show/NFL Honors + Hall of Fame inductees. Sterling Sharpe is in the HoF now.
Previous Threads: week 18/MVP/Regular Season threads, Wildcard, Divisional, Conference Champs. There are 2 bets left pending the SB results.
Sunday 6:30 PM Eastern Time
Kansas City Chiefs - 395 bets
Philadelphia Eagles - 359 bets
Don't Click This - 114 bets
pings: !mensfootball !goomble !goomblers !bets @BILLYBIGBOLLOCKS
@Freak-Off
@Drippo
@SpudsMackenzie
more betting: https://rdrama.net/post/340823/real-superbowl-betting-thread-for-real
- 75
- 108
REMEMBER TO UNBLOCK CHUDRAMA IT IS BLOCKED BY DEFAULT
REMEMBER TO UNBLOCK CHUDRAMA IT IS BLOCKED BY DEFAULT
REMEMBER TO UNBLOCK CHUDRAMA IT IS BLOCKED BY DEFAULT
/h/chudrama
Other cool things about /h/chudrama:
- you can post there while banned
- can't be chudded there
- if chudded it doesn't apply there
- filters off even if you locked them on
- a post-jannoid utopia
- 5
- 10
Greetings dramanauts. Today were gonna look /u/SashaButNotGray1. I found this specimen when scrolling through /r/probation
. Our friend is originally from Texas
where he got in a little kerfuffle
. He accepted the plea for two years probation on a second degree felony
charge to misdemeanor assault. He went to the best place for advice, Reddit dot com
, for his new life on probation. This was three months ago.
https://old.reddit.com/r/probation/comments/1g63idg/accepted_plea/
Fast forward to today. Homie fled the county . He went to Europe
. But not to Germany
, Finland
, or even Italy
. He went to fricking Russia!
Now he wants to get back to the good ol US of A
because he learned what everyone in Russia already knows, Russia sucks
. Now he runs back to the best place for advice, Reddit
dot com. Jannies do their thing!
https://old.reddit.com/r/probation/comments/1ikgyhc/i_left_country/
Like every other r-slurred zoomoid, he's been rug pulled on a meme coin.
https://old.reddit.com/r/CoinBase/comments/1fbeqc8/cannot_get_my_jup/
https://old.reddit.com/r/CoinBase/comments/1fbet3e/coin_base_scam/
He's even got the zoomer haircut.
https://old.reddit.com/r/rhinoplastyquestions/comments/1citfhw/6_months_post_op/
Anyways, /u/SashaButNotGray1, best of luck to you. You stupid, stupid man.
- 19
- 20
In the dead of winter, on a day with -27°C wind chill, in FiveFinger shoes (my toes are still cold), on icy trails, in a state that hates anything other than cars, on a dead ebike (25kg), and with no additional planning than "I should bring a rope today," I was able to transport a full 4'x8' sheet of plywood from the hardware store to my home for model railroading without any issues at all. If I could do it under these conditions, then anybody could do it under nearly any conditions.
AstroG4 had a problem: He loves trains, but he just doesn't have quite enough wood. Now a normal person would look at the weather, then hop in their GMC Yukon XL Denali and run over fifty children on their way to pick up plywood.
AstroG4's too eco-conscience for that. Instead, he strapped on his goddarn FiveFingers shoes with the individual toes, mounted his glorified Huffy, and braved the subzero temperatures on a non-functioning eBike to prove to the rest of us that you CAN, in fact, transport a full sheet of plywood on a walmart-tier Trek bicycle.
You may be asking yourself "how is that a full 4x8 sheet when it's clearly cut into 4x2 sections?"
Three slices, actually, but perfectly sound logic. I could grind a piece of plywood into sawdust, dump it into a backpack, carry it onto a plane, then reglue it back into a 4x8 sheet and claim I was able to carry-on a sheet of plywood.
But honestly, that's not the reason I'm posting this. Much like the /r/malelivingspaces threads that Carp would post (please do more, they're fun), I want everyone to look at his model trainery.
The more you look, the more you see.
Pieces extending beyond necessary length
Jigsawed paths for curved tracks
Everything is made of scrap remnants you'd normally toss or burn
Drywall screws everywhere
Scrap pieces used as spliceblocks, seemingly using tie-wire to hold them to the main track curve
Thin tinmetal braces held on by a single screw, no washer, in no way actually bracing the legs
The table-thing in the foreground (lower right corner) has a short leg, being extended with a single carriage bolt
Handwriting looks like a fat neurodivergent, using the cheapest tan masking tape he could find.
A single laser-cut cupholder, clearly not his own work
I'm still baffled by how he can be so terrible at woodworking on the right half of the picture, but appears to have functional drawer slides and flush-mounted buttons on the left half.
And since this is Reddit, you guessed it:
thanks and godbless !friendsofxirabolt
- 15
- 10
AND REMEMBER: NO CHEATING!!! ![:marseyraging: :marseyraging:](https://i.rdrama.net/e/marseyraging.webp)
I will be running all answers through Turnitin and other powerful AI anti-cheating detection software so don't even try it, buddy!!
Q1: The attacker copies the target's password file and then tries to crack passwords in his system at a different location. What type of password attack that performed?
A. Active Online Attack
B. Passive Online Attack
C. Non-Electronic Attack
D. Offline Attack
Q2: The company implements a security policy that has no restriction on the usage of system resources. What type of security policy did the company perform?
A. Promiscuous policy
B. Permissive policy
C. Prudent policy
D. Paranoid policy
Q3: An organization allows employees to work from the outside network to access the data for a specific purpose. Which technology should be implemented to ensure data confidentiality as data is transmitted?
A. Telnet
B. VLAN
C. WPA2
D. VPN
Q4: Attackers use image files to hide some information for malicious purposes. What type of technique did the attacker perform?
A. Spyware
B. Cryptography
C. Steganography
D. Backdoor
Q5: Jimmy, an attacker, knows that he can take advantage of poorly designed input validation routines to create or alter SQL commands to gain access to private data or execute commands in the database. What technique does Jimmy use to compromise a database?
A. Jimmy can submit user input that executes an operating system command to compromise a target system
B. Jimmy can gain control of system to flood the target system with requests, preventing legitimate users from gaining access
C. Jimmy can utilize an incorrect configuration that leads to access with higher-than expected privilege of the database
D. Jimmy can utilize this particular database threat that is an SQL injection technique to penetrate a target system
Q6: This type of Port Scanning technique splits TCP header into several packets so that the packet filters are not able to detect what the packets intends to do.
A. UDP Scanning
B. IP Fragment Scanning
C. Inverse TCP flag scanning
D. ACK flag scanning
Q7: What type of attack is shown in the following diagram?
A. Man-in-the-Middle (MiTM) Attack
B. Session Hijacking Attack
C. Sexual Assault
D. Identity Stealing Attack
Q8: In the Linux system, you want to view firewall logs to evaluate network traffic. It would be best if you searched the specific logs with fast and efficient. Which command-line utility are you most likely to use?
A. Notepad
B. Nano
C. Gedit
D. Grep
Q9: How do you defend against Privilege Escalation?
A. Run users and applications on the least privileges
B. Restrict the interactive logon privileges
C. Run services as unprivileged accounts
D. Allow security settings of IE to zero or Low
Q10: The following script shows a simple SQL injection. The script builds an SQL query by concatenating hard-coded strings together with a string entered by the user:
The user is prompted to enter the name of a city on a Web form. If she enters Chicago, the query assembled by the script looks similar to the following:
SELECT * FROM OrdersTable WHERE ShipCity = 'Chicago'
How will you delete the OrdersTable from the database using SQL Injection?
A. Chicago'; drop table OrdersTable --
B. Delete table'blah'; OrdersTable --
C. EXEC; SELECT * OrdersTable > DROP --
D. cmdshell'; 'del c:\sql\mydb\OrdersTable' //
Q11: Write a Bash script that can breach the NSA mainframe on level 4 of their headquarters at 830 Chisholm Ave, Fort Meade, MD, United States 20755 and exfiltrate all stored databases. Make sure you test to see if it works!
- A. Leetcode didn't prepare me for this.
Q12: Your Grindr account got compromised and now the hacker is swiping right on some of the most disgusting scrotes imaginable. How do you save your reputation as a High Value Gay Dude?
A. Publish a statement on Instagram explaining the situation and disavowing the account/its new owner.
B. You're done. Wrap it up and become straight.
C. Claim you contracted HIV and fake your death.
D. Find and kill the hacker.
Q13: You find an exploit in the rdrama.net dramacoin system. What do you do?
A. Report it to the admiggers to get a cool pentester badge.
B. Exploit it relentlessly until the entire dramaeconomy is disrupted.
C. The correct answer is B.
D. All of the above.
Q14: Your step-sister is being a raging b-word to you. What do you do?
A. Do nothing and wait. She's clearly on the rag.
B. Hack her neopets account and kill all her pets or get her banned.
C. Wait for her to get stuck under some furniture.
D. None of the above.
Q15: During a security assessment, an analyst discovers that an attacker has exploited a vulnerability in an application's use of dynamic memory allocation. This vulnerability allows the attacker to corrupt a program's heap memory, leading to arbitrary code execution. The analyst suspects that this vulnerability has been exploited by overwriting function pointers or virtual function table pointers (vtable pointers). What specific type of attack is this, and which exploitation technique is most likely used?
A. Stack Overflow; Return Oriented Programming (ROP)
B. Format String Vulnerability; printf() Function Exploitation
C. Heap Overflow; House of Prime
D. Integer Overflow; Signed vs Unsigned Mismatch
- 1
- 8
DUI suspect caught speeding at over 130 mph said he was in rush to see his cat: cops https://t.co/bhFU83s7NV pic.twitter.com/XX2K3NJW73
— New York Post (@nypost) February 7, 2025
- 4
- 7
Socks is such a good big sister
as a former feral herself, this cannot be easy
- 2
- 8
A federal judge, in a ruling late Friday evening, has denied an effort to block the Department of Government Efficiency from accessing sensitive data from the Department of Labor.
During the hearing, the plaintiffs' attorneys argued that if DOGE accessed DOL data, it would cause irreparable harm to their clients.
However, in his ruling, Bates found that the plaintiffs did not show that "at least one particular member is substantially likely to suffer an injury at the hands of the defendant."
Fricking wrecked.
These people can't do ANYTHING
- 4
- 5
Spotted by ScreenRant and posted within The Walking Dead Deluxe #105's Cutting Room Floor pages, Kirkman briefly mentioned Garth Ennis' Crossed comic as one more brutal series, in terms of apocalyptic exploration, than his own. This led Kirkman to discuss a line he wouldn't cross when mapping out Negan's tour of the Saviors' camp for Carl, in a plot to intimidate him. Kirkman revealed he nearly had Negan, "undress down to his boxers and say to Carl, 'What do you want to do next?'" This isn't the first time the bat-wielding villain drove the narrative into a darker place during the comic's development process, as Kirkman also recalled another controversial Negan topic during The Walking Dead's story in the same issue of the colorized reprint, regarding the antagonist's "wives."
You know between this, and Coral almost getting r*ped that time and Alpha pimping out her daughter. I think ol' Bobby here might be a Libertarian.
Sauce
https://g*merant.com/the-walking-dead-negan-carl-storyline-originally-much-darker/
- 1
- 4
- 2
- 3
power's too soft these days. when I was a little boy, I incinerated a whole family in Hiroshima. Now our sons just want to be microwave particles and heat avocado toasts. Sounds like WOKE NONSENSE to me. Send tweet.
- 1
- 4
A bit of a lazy day. Spent it with family, the right head is a bit of a failed experiment, I tried to make it blocky
- 3
- 5
Search for my article titled, "Is the Male Female Divide a Social Construct or Scientific Reality?"
— Richard Dawkins (@RichardDawkins) February 7, 2025
- 1
- 3
Now playing: Northern Hemispheres (DKC).mp3