Where Every Scroll is a New Adventure
being fictionkin is lowkey odd cause wdym I’m hacker from mcjams making bracelets for plushie dolls
LOADING INTO WORLD . . ⋆˙⟡
> HACKER [HEJUSTWONTDIE] HAS JOINED THE GAME.
Hello, everyone! My name is Hacker. :3
I decided to renew my intro, because the other one was sooo outdated I fear.
BASIC PLAYER INFO.
> Name: HACKER
> Nicknames? Sure! I love them! Feel free to call me whatever. :3
> Pronouns: He/It/She
> Extras/Neos: They/Xe , Shark/Glitch/Blade/Doll/Paws [these are all optional.]
THIS USER’Z <IDENTITY> LABELS
> Aromantic-spec , Asexual-spec
> Lesbian
> Agender [?]
OTHER GOOD THINGS TO KNOW !
> Permashift
> Fictionkin of many <list here>
> Age Regression
HYPERFIXATIONZ / SPINTEREST ★
> Minecraft Jamz ♡
> Jaws [1975 Film]
> Psychocuties/Психоняшки
> Dollmare
MY OTHER FANDOMZ
> SMG4
> Nintendo/Super Mario
> FNAF
> Minecraft/MC:SM
> BATIM
> etc ,, I’m not listing all that
BYF ! ☆
> I use typing quirks sparingly.
> I also LOVEEE oc/self insert x canon. Probably won’t post anymore than what I have on this blog, as it’s more dedicated to Minecraft.
BOUNDARY ! ★
. . I don’t really do dni lists anymore, but if you break any of these you’ll be blocked el oh el
> Be mindful when sending in ask/submissions for art. I am a minor, I won’t draw or do any freaky shit for you!
> Please ask and credit if you ever use or repost (this doesn’t include reblogging here on tumblr) my art. Seeing it on profiles w/o my permission makes me wildly uncomfortable. If you use anything PLEASE use the proper credit!
<MY SOCIALS>
☆ Tiktok
☆ Wattpad
★ Ao3
I literally made electrocreeper/hacker x blue boy or whatever u guyz call him huahahahj… /hj yeah idk what else to do for this bye
— HACKER
Bone spaghetti.
iz thiz a threat, anon 🙁 ( /j )
They are boyfriends, your honor. (might ramble abt em in my next post??? who knows)
Ey, because of quarantine I'm staying home and kinda returning to drawing to cope with isolation.
Here's a support tf2 characters with my support OC Hacker.
Still working on my imitation of the canon TF2 style. I think that I'm getting a little bit better.
Btw, Hacker's height in this pic isn't exaggerated just for the sake of showing contrast between two characters. She is just really short in comparison with other mercs.
*diabolical screech on the top of my lungs*
Honestly, I waisted too much time on this character sheet because I was trying to draw Hacker as close to canon tf2 comics as possible and I had to look up for a shitton of references like old mercenaries concept arts and comic strips.
(via "I am programmer angry man design " Pet Mat for Sale by RAZ1995)
Morpheus: This is your last chance. After this, there is no turning back. You take the blue pill - the story ends, you wake up in your bed and believe whatever you want to believe. You take the red pill - you stay in Wonderland and I show you how deep the rabbit-hole goes.
The most #Underground #Marketing #event on earth => 29th/6/2020 #GrowthHacker will love it . Please share🙏 #growthmarketing #marketingdigital #startup #startuplife #startupbusiness #startups #startuptips #automation #saas #business #entrepreneur #businessangels #investor #hightech #pirate #hacker #hackers #growthmindset https://www.instagram.com/p/CBRNMPaCtrc/?igshid=1t0452j2954iv
Mr. Robot is a fresh new show, but it quickly captured our attention and we don’t want you to miss it!
What it is about: Elliot Alderson (Rami Malek) is a socially-challenged cyber-security engineer who moonlights as a hacking vigilante, and discovers a hacking group with a mysterious endgame.
Why you should watch it: Plenty of things, from big to small details, set Mr. Robot apart from other courses we usually have on TV. Firstly, it is one of very few shows on TV that accurately portrays hacking—and the life and technology around it (Sam Esmail, the creator, was a coder I believe). For the ones who care, it is a very big deal since the portrayal of technology in most TV and movies has generally been... questionable.
Secondly, Mr. Robot explores the ongoing, and very relevant, fight between 99-percenters vs 1-percenters. Which might sound too vague and nebulous for some, but Mr. Robot smartly keeps the focus small—focusing on Elliot and the people he encounters instead. To keep things short, I’d just say Elliot himself is also a very interesting character, brought to life by Rami Malek’s intense talent.
Mr. Robot is also a very beautiful show to watch with a cinematic flair, and there are little touches that makes the show feel inherently progressive. Although definitely not in any significant roles (except one, for now), an Indian man, a Chinese, a gay, and young woman with hijab had all been portrayed during the total 2 episodes that had aired. It also recognizes the presence of misogyny in the tech world, and in general Mr. Robot is a very prescient show.
And it’s a damn good thriller.
Who should watch it: The ones who enjoy psychological thriller—especially Fight Club in regards to Elliot’s psychological state and Mr. Robot’s nihilism (and fans are calling it, there might be Tyler Durden-esque twist coming!)—or just general thriller, really. The techies. The paranoids, the secret anarchists, and just general TV/movie lover.
Where you should start: It’s been only a couple of episodes, so yeah, from the start. You can jump ahead to whatever episode airing, but you’ll miss the brilliant, movie-like pilot.
Status: 2 of 10 episodes already aired, and second season has been greenlighted due to strong buzz!
Bonus: The first 4-minute clip of Mr. Robot, watch!
Military - Information thieves have frequently come to this planet to execute scams involving the information they stole that inspired them
drew silver wolf from honkai star rail for my boyf, and i lowkey regret not pulling for her, lmao
Meto (shortened version of Oversharer's internaut name, "Metokos")
Sharing Devil (because some who haven't played the game would think Oversharer looks like a little devil)
Ovey (sometimes)
Darling
Lattie (derived from Hacker's internaut name, "Latras")
Femhunk (because she's freakishly strong for a girl shorter than Oversharer)
Lucky Clover (because Hacker wears green)
Hacks (sometimes)
Toots (think "eh, get used to it, toots")
Angel
Kiwi-Kitten (again because Hacker wears green)
Starlight
Limey Sweets
Oversharer: *singing* I’ve got a cruUUUUUU- Hacker: Oversharer! I didn’t realize anyone else was up here! Oversharer: *high pitched screaming*
Oversharer: Dinner's not ready yet, but thanks for coming, dudes! Mi casa is your house. Hacker: [eyes start to appear genuinely enticed at Oversharer's enthusiasm] Ooooo! Fancy! De nada! [starts to look at Phisher] Phisher... Phisher: [sighs] De nada... Cyberbully: [sarcastic] Yeah, thanks for coming. I was gonna throw myself in a volcano tonight, but hanging out with you guys is just as terrible.
Hacker: We brought you a birthday gift. Cyberbully: Is that the royal "we"? Oversharer: Whiskey with a pickle juice chaser. It's our station's birthday tradition. Cyberbully: Lovely! How can I refuse? Can I refuse? Hacker: Of course you can. and we'll always think less of you.
OverHacker (Oversharer x Hacker) aesthetic edit
Phisher: [looking into Oversharer's desk, seeing it's rigged] Oh, come on! What could be so secret, he wired it up with twelve pounds of C-4? Ugh, I don't...think I even want to know. [calls Hacker on their cell] Hacker: [annoyed] What? Phisher: Heh, nice. Here, take a look at this. [takes a picture of the C-4 wires] All right, which of these wires— Hacker: Blue and yellow. Phisher: The blue—you want to look at it for more than half a second? Hacker: I wired the damn thing, ass! Phisher: Well, I didn't know that, ASS! [cuts the wires, then opens the top drawer, pulling a memory stick out] Okay... Hacker: Oh, my God. Phisher: What? Hacker: I lied. I didn't wire it. Phisher: WHAT?!?! Hacker: BA-DUM-BUMP-DING!
Oversharer, drunk and holding a random guy beside him: Hacker, look. I met John Stamos! Hacker: That is not John Stamos! Oversharer, pointing at his and the random guy's belly-buttons: Hey, Hacker, John Stamos and I got our ears pierced! Hacker: That is not your ear. Oversharer: Hacker, John Stamos died... Why? Why, God? Why did you take John Stamos? back in the present Oversharer: …That doesn't sound so bad. Hacker: Oh, I forgot to mention: you were naked for a lot of that. back in the time where Oversharer was drunk Oversharer, naked and still sobbing: Stamos!… back in the present Hacker: Also, it wasn't here. It was at my office. again at the time where Oversharer was drunk, this time at Hacker's office Oversharer: We thought night swimming would be fun, but the current was too strong!… *again, at the present* Oversharer: ...Oh god, I wasn't driving around, was I?
Cyberbully: I still don’t have a New Year’s resolution. Oversharer: You could lose a few. Hacker: You could be less lazy. Phisher: Don’t be such a bitch. Cyberbully: Okay DAMN, SHIT.
Oversharer x Hacker CANON?!
He's not only an oversharer, as his name says, but he's also a bit of a pervert and/or casanova
He's dating Hacker and he's not ashamed of it despite many Interland citizens cursing their relationship
His charismatic nature and seductive ways are, for the most part, a way for him to get unsuspecting internauts to trust him
He was once an internaut named Metokos (that's derived from the Greek term for "Rapid sharer") and he shared anything that interested him, but he became an oversharer when tempted by the lady he knew as the town's oversharer back then, who later became identified as "Tentata" (that comes from the Latin word for "Tempter")
He's the kind of guy to smugly say "I know" when you tell him that you thought you could trust him
===============================
===============================
She's a tomboyish girl who rarely, if ever, smiles, and who is sadistic but also somewhat sensitive deep inside
She's dating Oversharer and she threatens to hack anyone who talks shit about their relationship
She was once an internaut named "Latras" (that basically means "thief" in Latin) and she would steal others' works online but she became a hacker when she hacked her first victim... on accident, and she felt really good when she hacked the person
She's absurdly strong for her size (she's in between Oversharer and Cyberbully in height) and nobody ever dared to fistfight her because of it
She sometimes likes to tell demented, twisted versions of real stories of her hackings to the other Interland enemies around Halloween to scare the shit out of them
===============================
===============================
He's the kind of guy to flip you off for no particular reason
He's easily the youngest yet most foul-mouthed out of all the other Interland enemies and often it's Hacker who tells him to watch his language
He talks in a way similar to Selever from FNF, especially when he bullies others (e.g.: "Expect to hear me jab at you a lot, idc if it hurts your feelings")
He was once an internaut named Draznilka (that's Russian for "teaser") and he'd often tease others for minor things, and he became a cyberbully when he took his teasing too far one day by "jokingly" telling an internaut to kill themselves
Although he claims to not be afraid of anything, he's actually a real scaredy-cat
===============================
===============================
They were born a flat-chested female but became non-binary when they were around 11 or so
They like to chill at Reality River on slow days
They were once an internaut named "Muzaya" (that's derived from the Arabic word for "faker") and they would sell lemonade mixed with iced tea and advertise it as regular lemonade
tying to the third headcanon they were pretty much always a scammer always trying to look for money
Although they're an adult like Oversharer and Hacker, they tend to jump all over the place when it comes to what age they act as
And now their adversary, Legend, is here!
Cyberbully
Hacker
Oversharer
Phisher
OVERSHARER X HACKER ALL THE WAYYYYYYYYYYYYYYYY
Cyberbully
Hacker
Oversharer
Phisher
Il gruppo hacker Nobelium, legato agli attacchi Solar Winds, è riuscito a compromettere il computer di un lavoratore Microsoft. Microsoft ha dichiarato venerdì che l’accesso è stato utilizzato per lanciare attacchimirati contro i clienti dell’azienda. La scoperta è avvenuta mentre Microsoft stava indagando su nuove violazioni da parte dello stesso gruppo di hacker.
Secondo Microsoft, gli hacker hanno utilizzato le informazioni raccolte dagli strumenti per avviare attacchi “altamente mirati” su specifici clienti Microsoft. La società afferma di aver contattato i clienti interessati dall’uso degli strumenti da parte del gruppo di hacker e che Nobelium non ha più accesso al dispositivo dell’agente dell’assistenza clienti. Microsoft ha avvertito i clienti interessati di prestare attenzione alle comunicazioni con i propri contatti di fatturazione e di prendere in considerazione la modifica di tali nomi utente e indirizzi e-mail, oltre a impedire ai vecchi nomi utente di accedere.
Secondo quanto rivelato dall’azienda, Nobelium ha provato a fare breccia all’interno degli strumenti dell’Assistenza Clienti Microsoft senza riuscirci veramente in nessuno dei target principali. A quanto pare infatti, solo tre degli obiettivi strategici di Nobelium sono stati compromessi, ma la compagnia non ha rivelato ulteriori dettagli in merito
Leggi tutto su Andrea Biraghi Blog
Report Proofpoint: campagna phishing BadBlood
BadBlood, è questo il nome che i ricercatori di sicurezza hanno dato alla campagna phishing che ha preso di mira — alla fine del 2020 — professionisti e ricercatori nel campo della genetica, della neurologia e onlcologia. I ricercatori attaccati hanno sede in Israele e Stati Uniti.
Secondo il report Proofpoint, negli attacchi informatici del 2020, TA453, è stato un gruppo hacker iraniano, ad aver lanciato una campagna di phishing che ha preso di mira le credenziali dei professionisti medici negli Stati Uniti e in Israele. Il gruppo TA453 — che è noto anche come CHARMING KITTEN e PHOSPHORUS — storicamente allineato con lil Corpo delle Guardie Rivoluzionarie Islamiche (IRGC) — nel tempo ha preso di mira dissidenti, accademici, diplomatici e giornalisti.
Leggi su Andrea Biraghi Cyber Security Blog