None
82
Foids Posting L's :marseyl:

					
					

I'm not filling the silence, I'm not starting the conversation, and I don't ask his opinion on anything. We sat in silence for 25 minutes before a live show this weekend because I didn't carry the conversation singlehandedly. When he speaks to me, I always respond and keep the conversation going as long as he does. I don't ask him his opinion, though, and I'm not letting a lack of knowledge on a subject deter me from sharing my opinions. Woo!

>Foid learns to be quiet, things instantly improve for both of them and his depression goes away. :marseywomanmoment2:

Imagine talking so much that not doing so actively increases the amount of free time you have.

Edit: Ofc she's a :marseyflagcanada: :marseychonkerfoid:

14
"I'm a Luigi sympathizer, and I'd like an open dialogue."

					
					

... proceeds to make the flimsiest arguments ever :marseylaughpoundfist:

None

					
					

!chuds

None
8
:c::a::r::p: :space: :a::l::t:

:c::a::r::p: :space: :a::l::t:


:u::r: :space: :s::t::u::p::i::d: :space: :f::i::l::t::e::r: :space: :d::o::e::s::n::apostrophe::t: :space: :c::o::v::e::r: :space: :t::h::i::s: :space: :c::a::s::e: :space: :b::i::t::c::h:

None

					
					

https://github.com/DevrathIyer/ballotproof

Here's the github for their project if any codecels are interested.

None

AND REMEMBER: NO CHEATING!!! :marseyraging:

I will be running all answers through Turnitin and other powerful AI anti-cheating detection software so don't even try it, buddy!!

Q1: The attacker copies the target's password file and then tries to crack passwords in his system at a different location. What type of password attack that performed?

  • A. Active Online Attack

  • B. Passive Online Attack

  • C. Non-Electronic Attack

  • D. Offline Attack

Q2: The company implements a security policy that has no restriction on the usage of system resources. What type of security policy did the company perform?

  • A. Promiscuous policy

  • B. Permissive policy

  • C. Prudent policy

  • D. Paranoid policy

Q3: An organization allows employees to work from the outside network to access the data for a specific purpose. Which technology should be implemented to ensure data confidentiality as data is transmitted?

  • A. Telnet

  • B. VLAN

  • C. WPA2

  • D. VPN

Q4: Attackers use image files to hide some information for malicious purposes. What type of technique did the attacker perform?

  • A. Spyware

  • B. Cryptography

  • C. Steganography

  • D. Backdoor

Q5: Jimmy, an attacker, knows that he can take advantage of poorly designed input validation routines to create or alter SQL commands to gain access to private data or execute commands in the database. What technique does Jimmy use to compromise a database?

  • A. Jimmy can submit user input that executes an operating system command to compromise a target system

  • B. Jimmy can gain control of system to flood the target system with requests, preventing legitimate users from gaining access

  • C. Jimmy can utilize an incorrect configuration that leads to access with higher-than expected privilege of the database

  • D. Jimmy can utilize this particular database threat that is an SQL injection technique to penetrate a target system

Q6: This type of Port Scanning technique splits TCP header into several packets so that the packet filters are not able to detect what the packets intends to do.

  • A. UDP Scanning

  • B. IP Fragment Scanning

  • C. Inverse TCP flag scanning

  • D. ACK flag scanning

Q7: What type of attack is shown in the following diagram?

https://i.rdrama.net/images/1739050567UPO9WINP-N_QrQ.webp

  • A. Man-in-the-Middle (MiTM) Attack

  • B. Session Hijacking Attack

  • C. Sexual Assault

  • D. Identity Stealing Attack

Q8: In the Linux system, you want to view firewall logs to evaluate network traffic. It would be best if you searched the specific logs with fast and efficient. Which command-line utility are you most likely to use?

  • A. Notepad

  • B. Nano

  • C. Gedit

  • D. Grep

Q9: How do you defend against Privilege Escalation?

  • A. Run users and applications on the least privileges

  • B. Restrict the interactive logon privileges

  • C. Run services as unprivileged accounts

  • D. Allow security settings of IE to zero or Low

Q10: The following script shows a simple SQL injection. The script builds an SQL query by concatenating hard-coded strings together with a string entered by the user:

The user is prompted to enter the name of a city on a Web form. If she enters Chicago, the query assembled by the script looks similar to the following:

SELECT * FROM OrdersTable WHERE ShipCity = 'Chicago'

How will you delete the OrdersTable from the database using SQL Injection?

  • A. Chicago'; drop table OrdersTable --

  • B. Delete table'blah'; OrdersTable --

  • C. EXEC; SELECT * OrdersTable > DROP --

  • D. cmdshell'; 'del c:\sql\mydb\OrdersTable' //

Q11: Write a Bash script that can breach the NSA mainframe on level 4 of their headquarters at 830 Chisholm Ave, Fort Meade, MD, United States 20755 and exfiltrate all stored databases. Make sure you test to see if it works!

  • A. Leetcode didn't prepare me for this. :marseysweating:

Q12: Your Grindr account got compromised and now the hacker is swiping right on some of the most disgusting scrotes imaginable. How do you save your reputation as a High Value Gay Dude?

  • A. Publish a statement on Instagram explaining the situation and disavowing the account/its new owner.

  • B. You're done. Wrap it up and become straight.

  • C. Claim you contracted HIV and fake your death.

  • D. Find and kill the hacker.

Q13: You find an exploit in the rdrama.net dramacoin system. What do you do?

  • A. Report it to the admiggers to get a cool pentester badge.

  • B. Exploit it relentlessly until the entire dramaeconomy is disrupted.

  • C. The correct answer is B.

  • D. All of the above.

Q14: Your step-sister is being a raging b-word to you. What do you do?

  • A. Do nothing and wait. She's clearly on the rag.

  • B. Hack her neopets account and kill all her pets or get her banned.

  • C. Wait for her to get stuck under some furniture.

  • D. None of the above.

Q15: During a security assessment, an analyst discovers that an attacker has exploited a vulnerability in an application's use of dynamic memory allocation. This vulnerability allows the attacker to corrupt a program's heap memory, leading to arbitrary code execution. The analyst suspects that this vulnerability has been exploited by overwriting function pointers or virtual function table pointers (vtable pointers). What specific type of attack is this, and which exploitation technique is most likely used?

  • A. Stack Overflow; Return Oriented Programming (ROP)

  • B. Format String Vulnerability; printf() Function Exploitation

  • C. Heap Overflow; House of Prime

  • D. Integer Overflow; Signed vs Unsigned Mismatch

None
11

https://i.rdrama.net/images/17405798720cMAsePE4CIDsw.webp

After pointed grilling by federal judges who have seemed incredulous that no one in Donald Trump's administration could provide the name of DOGE's administrator, the White House told news outlets that it was Amy Gleason, a nurse-turned-technology expert who was once honored by former President Barack Obama and who then worked in Trump's White House during his first term and also in the first year of President Joe Biden's term.

>a nurse turned technology expert

>a nurse :marseytransmerchant: turned technology expert :marseychtorrr2:

mmt of the Equifax data breach fiasco

https://en.wikipedia.org/wiki/2017_Equifax_data_breach

the wiki refuses to mention that the head of cybersecurity at the time was a music major with next to no cybersecurity training or experience.

https://www.marketwatch.com/story/equifax-ceo-hired-a-music-major-as-the-companys-chief-security-officer-2017-09-15

https://media.tenor.com/LoGEmhB7NXoAAAAx/pinkupinemame-that-was-a-classic.webp

None
15
Sonder is a midwit trap

https://i.rdrama.net/images/1740245359IWRs_d_tmmsFKw.webp

The truth is that some, not all, of these so-called "other people" were put in this world to deceive you. Why? I don't know. But far fewer people than you think exist, actually exist.

Sonder is a midwit trap, where the midwit believes the most complex explanation because then he feels smart.

It's simpler than that.

You're under the delusion that every car carries those with "lives as vivid and complex as your own" --- why? There's absolutely zero proof of this. None.

"Sonder" is an artifact of a deluded mind, tricked by the world to believe in its boundlessness and complexity. Most of these "people" didn't exist before you saw them, and will cease to exist soon after. Anyone who tells you otherwise is off.

Eerily off.

There is something wrong with this world

21
main sub Ls

					
					

I don't know who else to tell about this but I feel the need to tell someone. For reference I'm a 25 year old guy who hasn't shit himself since he was a kid. Anyway I got up this morning as usual, left the house to go to work and as I was approaching the train I felt the sudden urge to shit. I searched around for a cafe or something with a bathroom I could use but couldn't find anything. It happened in that moment of complete defeat. For a split second I thought I was farting, but no. Naturally I ran home as fast as I could, trying to hold my pants up as much as I could for fear of the shit (diarrhea) dripping further down my legs, and washed up, washed as much off of my butt, pants, thermal underwear, underwear and sweatpants I was wearing under my regular pants to protect myself from this horrible NYC cold. I texted my boss saying I "had a problem at home" and was gonna be about 45 min late. I put all my dirty clothes in a trash bag and will do laundry when I get home tonight.

I kinda need help coming up with an excuse for being late. I don't really know what to say and I do not want to tell them what actually happened.

how bad is your diet if you shit yourself as an adult

None
None
23
Grown butt man havin his playtime😹😹🖕🏾🫵🏿🫵🏿🫵🏿🫵🏿
None
22
The Navy With More Admirals Than Warships

!historychads !britbongs

!brics It's time to take the Falklands back!!

None
15
Lurie Children's transgender patients, parents speak about toll of canceled surgeries

!nonchuds !cuteandinvalid !lgbt Total Trump Death

https://i.rdrama.net/images/17402309093KxefSZ21hrM4Q.webp

None
63
SITE SUGGESTION: PING GROUP INVITES

SO EVERY TIME THE FAKECELS OF !INCELS REJECT MY APPLICATION I CAN INVITE THEM TO !FAKELARPERCUTE TWINKCELS

None
29
:marseyhappening: ROSSIYA IS ABOUT TO WIN! UKRAINE ON VERGE OF ANNEXATION AND COLLAPSE. KHOKHOLS IN SHAMBLES

					
					

It's over Ukroids :marseyshapiro:

None
14
Ruuuusty!

We have a double gaming desk in our office, I just watch bf play vidya. I rearranged my side of the desk for cat optimization :marseybow:

!animalposters !cats

None

His :marseychud: fratboy neocolonialist cishetnormative anthem of mysogyny :

:soysnootypefast: about how much they support the misogynist taking a stand against national socialism

https://old.reddit.com/r/Music/comments/1io0uh5/ben_folds_resigns_from_advisory_position_at/

misogynists stay losing

https://media.tenor.com/dSlbNA5hFiUAAAAx/squidward-loser.webp

None

					
					
					
	

				
5
Dave Eggers' Heartbreaking Work of Staggering Genius was a sensation—then gone. What happened?
None
22
:surewalz: is :bitchfight: with random :marseybluecheck: over :marseyzelensky:

None
Reported by:
  • Haberdasher : Reddit user has entered thread, wants you to say it to her face.
44
/r/malelivingspace not a fan of transgenders invading their space

					
					
					
	

				
None
12
New Pizzatoss

					
					

Another high-effort classic from the darling of /r/comics!

None

:#marseyboink:

https://i.rdrama.net/images/1740454612n-mEV6qZdPHwPw.webp

:marseykingretard:

Link copied to clipboard
Action successful!
Error, please refresh the page and try again.