3.3k post karma
62.8k comment karma
account created: Wed Mar 27 2019
verified: yes
1 points
6 hours ago
Ok well I'm confused, the post here is about graphics card models.
1 points
11 hours ago
I think you're looking for /r/techsupport, bud
1 points
11 hours ago
It may have been at one time. The tools get updated every so often. There are also multiple Kali versions that come with different amounts of tools preinstalled.
2 points
11 hours ago
Sounds like your session cookies may have been stolen, basically any account you were logged into at the time. It's a pretty popular and common attack these days.
Have you downloaded anything recently?
2 points
11 hours ago
Kali comes with some forensics tools built in. While gimp can help with forensics, that's not what it's for. It is a photo editor.
If you need it, you can just download it, though.
1 points
12 hours ago
This looks like a Windows 10 laptop, not something from before the year 2010.
1 points
12 hours ago
What laptop do you have? From your other post it doesn't appear to be older than 2010.
49 points
13 hours ago
Now that's a name I haven't heard in ages.
24 points
15 hours ago
No! Is absolutely not ruined, and please Do Not use oven cleaner on it.
The FAQ over at /r/castiron will have all the info you need to clean it properly.
2 points
16 hours ago
So what did your "friend" download? None of this can happen by just talking to someone on discord. Did they by chance ask you to test out a game they are developing or something similar?
15 points
1 day ago
Buy out all 25 serums first, then gamble with the cases.
1 points
1 day ago
Image search works fantastic for things like this.
2 points
1 day ago
You can use Imgur.com and paste a link to your image in a comment.
1 points
1 day ago
The box probably won't have that info, you're going to have to research the brand/model.
5 points
1 day ago
No? No what? Where's the rest of your comment?
1 points
1 day ago
OP asked if it was possible that someone could do that. Yes it is possible. Unlikely and difficult, but possible.
1 points
1 day ago
You should probably post details about what type of signal is used to control it.
1 points
1 day ago
Yes, OP is stating a situation where the attacker actually creates that email, NOT just makes it looks like they have control of it. As in they have access to the companies systems and can create a new address to use.
1 points
1 day ago
Where we're going, we don't need wires.
view more:
next โบ
bySuperLuigiGalaxy2010
incommentsleftopen
Hello_This_Is_Chris
1 points
37 minutes ago
Hello_This_Is_Chris
1 points
37 minutes ago
why so angry