None
34
:marseyemojilaugh:

					
					

!nooticers !transphobes

https://i.rdrama.net/images/1739724909zGyRbmckpMwZqw.webp

None
34
The most Reddit thing ever :marseytransattentionseeker:

					
					

Lol

None

					
					

:#marseycut:

https://media.tenor.com/j0BAcRArt6kAAAAx/luka-luka-doncic.webp

None
22
this is cirno
None

					
					

https://i.rdrama.net/images/1738776455qtpHpyAxGXArXg.webp

Those minnesota links are to a channel/playlist that just redirects to a channel (not an actual livestream)

right now some guy is talking about midwifes

>33 people watching

https://i.rdrama.net/images/1738776458LLT3Ix6ctfXv8A.webp

DRUMPF is finished

None
10
The trans :marseytrain: Americans turning to guns :marseytrollgun:for protection

https://media.tenor.com/2NP_Oweuw-8AAAAx/megan-rapinoe-lesbian.webp

None
23
AITA for being repulsively hideous?

					
					

AITA for continuously triggering her trypophobia?

(Trypophobia is an intense and disproportionate fear or disgust for holes, bumps, or patterns that are clustered together or repetitive)

(aka r-slurred)

I (19F :marseywall:) have had acne for so long that I honestly can't remember my skin without it. I used to wear a lot of concealer to cover it up, but that only made things worse. Eventually, I realized my skin was controlling my life (and draining my bank account πŸ’€), so when I started at a new school, I decided to stop wearing makeup :chinkbitch:. My skin still isn't great, but I'm on medication, so I have some hope that it will improve.

Here's the problem: There's a girl in my class, let's call her Callie (18F :!marseybooba:), who has trypophobia [is r-slurred]. I had no idea until we were put in a group together. The moment I spoke to her, she started crying. Naturally, I asked what was wrong, and she screamed at me that my face was triggering her trypophobia :marseywitchtriggered:. Her friends immediately jumped in to comfort her :marseypearlclutch2: while I just sat there, confused, wondering if I was supposed to apologize for my skin, something I obviously didn't choose to have :10inbongland:.

When I tried to speak again, she told me to shut up and leave because I was " :gigachadnoticeme: drawing attention to myself by talking. :gigachadnoticeme:" I asked what she expected me to do about it, and she said I could at least wear concealer. I explained that it wasn't an option because it's expensive :marseypoor: and just worsens my acne. Her friends glared at me and called me selfish :marseymeangirls:.

That was just the first incident. Ever since, anytime I sit near Callie or have to present in front of the class, she starts dry heaving or crying :marseychonkerfoidpuke: (having a panic attack?) :marseywomanmoment2:. It's disrupting lessons so much that my teacher pulled me aside and asked if I could just wear concealer for the sake of keeping the peace. She admitted it wasn't fair but said she couldn't think of another solution.

I already feel like such a freak because of my skin. I know my skin is horrid, :marseyskinnedwalk: but why am I the one expected to cater to Callie? I didn't choose to have acne any more than she chose to have trypophobia. I can't help but feel like I'm being unfairly treated here, but at the same time, I know she can't control her reaction either.

So… AITA? Should I just wear the darn concealer?

!r-slurs !neurodivergents !foidmoment !\verifiedugly

None
16
Tim Pool reproduced and you did not

It's over for rdrama

None
14
Corncel has a schizo moment thinking the feds are after him becauss he doesn't like Trump

					
					

R-slur received a scam voicemail and loses his mind. Majority of corncels take the bait as well.

None

					
					

Δ»Π΅gΓ­t Γ­ts Γ­mΡ€Ε™Π΅sΓ­vΠ΅ hΠΎw wΓ­th ΔΌΓ­ttΔΌΠ΅ Γ­ntСřасtΓ­ΠΎn wΓ­th сhСсhΠ΅ns UkΕ™Π°Γ­nΓ­Π°n gΠ΅ttΓ­ng сhСсhΠ΅n mΠ°nΠ΅Ε™Γ­sm Π°nd ассСnt

None
38
Prominent Train James Elisa Rae Shupe roped...

https://ovarit.com/o/GenderCritical/659572/james-shupe-first-nonbinary-passport-ended-his-life-a-month-after-vaginoplasty

here is an interview with him (which i didnt watch)...

>highly informative and filled in a lot of blanks. When he was lucid, James was able to explain exactly how porn addiction led him to his fetish, and why there's an over-representation of AGPs in the military. He was able to explain precisely how psychiatrists basically brainwashed people into believing that they are trans. A lot of details we roughly suspected but he gave very concrete, clear experiences.

suicide note (didnt read) but apparently he was mad at Elon...

>Have that Nazi piece of shit Elon Musk and his DOGE henchmen deduct the savings from my $93,000 of federal pensions from your bankrupt coffers.

https://zerodoesntsleep.substack.com/p/vet-found-hanging-draped-in-trans

None
37
Fighting back against Redditors
47
look at this cute tired deer

None
9
DRC invites daddy to Leopold them.

I was considering an effort post on DRC as it's a good example of what's happening with daddies foreign policy. Can't be bothered to do an effort post today but some potential mining sites in this as it develops.

Rwanda have had a slow burning war with DRC since the 90's but the France and the US have largely kept them in check. They can quietly support their little separatist group as long as they don't try and expand the conflict beyond the eastern province they are in and they mostly ignore the war crimes. Rwanda has been using DRC resources to fuel their growth and want more.

DRC is much larger than Rwanda but it's been a failed state since the 90's and while some form of government has existed since 2005 it's limited to the West and South of the country and is very weak. Rwanda have relatively modern, for Africa, armed forces, and all the gibs they got post-genocide mean they have good infrastructure for that part of the world. Rwanda have also had the same president for 25 years who keeps "winning" with 90%+ of the vote.

When the US eyes went away the guerillas in DRC suddenly had tanks and helicopters. A couple of weeks later when no one did anything there were suddenly a whole bunch of Rwandan troops in the country and they easily took the largest city in the east. They have stated they intend to keep moving West and "liberate" the entire country.

In terms of natural resource value DRC is one of the wealthiest countries in the world. It's so profoundly undeveloped, has problematic geography and terrible security that no one has been willing to take it on.

Most of the time offers like this would be absurd but this is the type of "deal" Trump loves. Hopefully he restarts the Belgian mining practices and cuts childrens hands off.

None
36
Happy Valentine's Day! Remember straggots: a wank a day keeps the foids at bay

!coomers @Discuss

!schizomaxxxers

None
8
Switched to Librewolf, everything seems to work so far

Copy-pasted my local firef*x profile over since I'm too attached to my beloved browser data :marseyantiwork:

None

AND REMEMBER: NO CHEATING!!! :marseyraging:

I will be running all answers through Turnitin and other powerful AI anti-cheating detection software so don't even try it, buddy!!

Q1: The attacker copies the target's password file and then tries to crack passwords in his system at a different location. What type of password attack that performed?

  • A. Active Online Attack

  • B. Passive Online Attack

  • C. Non-Electronic Attack

  • D. Offline Attack

Q2: The company implements a security policy that has no restriction on the usage of system resources. What type of security policy did the company perform?

  • A. Promiscuous policy

  • B. Permissive policy

  • C. Prudent policy

  • D. Paranoid policy

Q3: An organization allows employees to work from the outside network to access the data for a specific purpose. Which technology should be implemented to ensure data confidentiality as data is transmitted?

  • A. Telnet

  • B. VLAN

  • C. WPA2

  • D. VPN

Q4: Attackers use image files to hide some information for malicious purposes. What type of technique did the attacker perform?

  • A. Spyware

  • B. Cryptography

  • C. Steganography

  • D. Backdoor

Q5: Jimmy, an attacker, knows that he can take advantage of poorly designed input validation routines to create or alter SQL commands to gain access to private data or execute commands in the database. What technique does Jimmy use to compromise a database?

  • A. Jimmy can submit user input that executes an operating system command to compromise a target system

  • B. Jimmy can gain control of system to flood the target system with requests, preventing legitimate users from gaining access

  • C. Jimmy can utilize an incorrect configuration that leads to access with higher-than expected privilege of the database

  • D. Jimmy can utilize this particular database threat that is an SQL injection technique to penetrate a target system

Q6: This type of Port Scanning technique splits TCP header into several packets so that the packet filters are not able to detect what the packets intends to do.

  • A. UDP Scanning

  • B. IP Fragment Scanning

  • C. Inverse TCP flag scanning

  • D. ACK flag scanning

Q7: What type of attack is shown in the following diagram?

https://i.rdrama.net/images/1739050567UPO9WINP-N_QrQ.webp

  • A. Man-in-the-Middle (MiTM) Attack

  • B. Session Hijacking Attack

  • C. Sexual Assault

  • D. Identity Stealing Attack

Q8: In the Linux system, you want to view firewall logs to evaluate network traffic. It would be best if you searched the specific logs with fast and efficient. Which command-line utility are you most likely to use?

  • A. Notepad

  • B. Nano

  • C. Gedit

  • D. Grep

Q9: How do you defend against Privilege Escalation?

  • A. Run users and applications on the least privileges

  • B. Restrict the interactive logon privileges

  • C. Run services as unprivileged accounts

  • D. Allow security settings of IE to zero or Low

Q10: The following script shows a simple SQL injection. The script builds an SQL query by concatenating hard-coded strings together with a string entered by the user:

The user is prompted to enter the name of a city on a Web form. If she enters Chicago, the query assembled by the script looks similar to the following:

SELECT * FROM OrdersTable WHERE ShipCity = 'Chicago'

How will you delete the OrdersTable from the database using SQL Injection?

  • A. Chicago'; drop table OrdersTable --

  • B. Delete table'blah'; OrdersTable --

  • C. EXEC; SELECT * OrdersTable > DROP --

  • D. cmdshell'; 'del c:\sql\mydb\OrdersTable' //

Q11: Write a Bash script that can breach the NSA mainframe on level 4 of their headquarters at 830 Chisholm Ave, Fort Meade, MD, United States 20755 and exfiltrate all stored databases. Make sure you test to see if it works!

  • A. Leetcode didn't prepare me for this. :marseysweating:

Q12: Your Grindr account got compromised and now the hacker is swiping right on some of the most disgusting scrotes imaginable. How do you save your reputation as a High Value Gay Dude?

  • A. Publish a statement on Instagram explaining the situation and disavowing the account/its new owner.

  • B. You're done. Wrap it up and become straight.

  • C. Claim you contracted HIV and fake your death.

  • D. Find and kill the hacker.

Q13: You find an exploit in the rdrama.net dramacoin system. What do you do?

  • A. Report it to the admiggers to get a cool pentester badge.

  • B. Exploit it relentlessly until the entire dramaeconomy is disrupted.

  • C. The correct answer is B.

  • D. All of the above.

Q14: Your step-sister is being a raging b-word to you. What do you do?

  • A. Do nothing and wait. She's clearly on the rag.

  • B. Hack her neopets account and kill all her pets or get her banned.

  • C. Wait for her to get stuck under some furniture.

  • D. None of the above.

Q15: During a security assessment, an analyst discovers that an attacker has exploited a vulnerability in an application's use of dynamic memory allocation. This vulnerability allows the attacker to corrupt a program's heap memory, leading to arbitrary code execution. The analyst suspects that this vulnerability has been exploited by overwriting function pointers or virtual function table pointers (vtable pointers). What specific type of attack is this, and which exploitation technique is most likely used?

  • A. Stack Overflow; Return Oriented Programming (ROP)

  • B. Format String Vulnerability; printf() Function Exploitation

  • C. Heap Overflow; House of Prime

  • D. Integer Overflow; Signed vs Unsigned Mismatch

None
63
SITE SUGGESTION: PING GROUP INVITES

SO EVERY TIME THE FAKECELS OF !INCELS REJECT MY APPLICATION I CAN INVITE THEM TO !FAKELARPERCUTE TWINKCELS

None
24
!burgers hate to see real bipoc excellence in warfare.

@HailVictory1776

@iowa_hawkeye

None
7
Ok im done. These :marseysnappy: :marseyrobot: comments
16
Sent my AirPod case through the washing machine πŸ’”

L

14
:marseysnappy:

					
					
					
	

				
None
17
RUSTY AND RENA

My precious bbs :marseyheart: :marseyfluffy: :marseybow: :marseyhearts: :marseyadmire:

!animalposters !cats

None
11
WB is in shambles

					
					
					
	

				
None

					
					
					
	

				
Link copied to clipboard
Action successful!
Error, please refresh the page and try again.