Cerrar Menú Blogs
Las opiniones de los blogueros son de su estricta responsabilidad y no representan la opinión de este portal.
Profile image

Ingresa o regístrate acá para seguir este blog.

Seguir este blog

 | El lado oscuro de Internet también está en Facebook:click acá!

Habrá esto ocurrido en realidad? Ya ha sido publicado en numerosos sitios; yo lo tomé de acá.

Y perdón por las malas palabras!!!

The World”s Worst Hacker

The story starts (I”m shortcutting here) with an [Please control your cussing] insulting everyone on the IRC channel. Most people there believed it was rather funny, but it got even more funny. For information: The dangerous hacker is called bitchchecker and the one being hacked and original author of the comments, who is talking here, is known as Elch. 127.0.0.1 is always the IP-adress of the computer you”re currently using, any request there will return to your computer.

QUOTE

* bitchchecker (~java@euirc-a97f9137.dip.t-dialin.net) Quit (Ping timeout#)
* bitchchecker (~java@euirc-61a2169c.dip.t-dialin.net) has joined #stopHipHop
why do you kick me
can”t you discus normally
answer!
we didn”t kick you
you had a ping timeout: * bitchchecker (~java@euirc-a97f9137.dip.t-dialin.net) Quit (Ping timeout#)
what ping man
the timing of my pc is right
i even have dst
you banned me
amit it you son of a bitch
LOL
shit you”re stupid, DST^^
shut your mouth WE HAVE DST!
for two weaks already
when you start your pc there is a message from windows that DST is applied.
You”re a real computer expert
shut up i hack you
ok, i”m quiet, hope you don”t show us how good a hacker you are ^^
tell me your network number man then you”re dead
Eh, it”s 129.0.0.1
or maybe 127.0.0.1
yes exactly that”s it: 127.0.0.1 I”m waiting for you great attack
in five minutes your hard drive is deleted
Now I”m frightened
shut up you”ll be gone
i have a program where i enter your ip and you”re dead
say goodbye
to whom?
to you man
buy buy
I”m shivering thinking about such great Hack0rs like you
* bitchchecker (~java@euirc-61a2169c.dip.t-dialin.net) Quit (Ping timeout#)

What happened is clear: That guy entered his own IP-Adress in his mighty Hack-Tool and crashed his own PC. This way, the attack on my PC was a failure. I was already starting to think that I did not have to worry, but a good hacker never calls it a day. Two minutes later he returned.
QUOTE

* bitchchecker (~java@euirc-b5cd558e.dip.t-dialin.net) has joined #stopHipHop
dude be happy my pc crashed otherwise you”d be gone
lol
bitchchecker: Then try hacking me again… I still have the same IP: 127.0.0.1
you”re so stupid man
say buy buy
ah, [Please control your cussing] off
buy buy elch
* bitchchecker (~java@euirc-b5cd558e.dip.t-dialin.net) Quit (Ping timeout#)

There was a tension in the room… Would he manage, after these two failures, to crash my PC? I waited. Nothing happened. I felt relieve… Six minutes passed by until he prepared the next wave of attack. Being a Hacker, who usually cracks whole data centers, he knew what his problem was now.
QUOTE

* bitchchecker (~java@euirc-9ff3c180.dip.t-dialin.net) has joined #stopHipHop
elch you son of a bitch
bitchchecker how old are you?
What”s up bitchchecker?
you have a frie wal
fire wall
maybe, i don”t know
i”m 26
such behaviour with 26?
how did you find out that I have a firewall?
tststs this is not very nice missy
because your gay fire wall directed my turn off signal back to me
be a man turn that shit off
cool, didn”t know this was possible.
thn my virus destroys your pc man
are you hacking yourselves?
yes bitchchecker is trying to hack me
he bitchchecker if you”re a hacker you have to get around a firewall even i can do that
yes man i hack the elch but the sucker has a fire wall the
what firewall do you have?
like a girl
firewall is normal a normal hacker has to be able to get past it…you girl^^
Bitch give yourself a jackson and chill you”re letting them provoce you and give those little girls new material all the time
turn the firewall off then i send you a virus [Please control your cussing]er
Noo
he bitchchecker why turn it off, you should turn it off
you”re afraid
i don”t wanna hack like this if he hides like a girl behind a fire wall
elch turn off your shit wall!
i wanted to say something about this, do you know the definition of hacking??? if he turns of the firewall that”s an invitation and that has nothing to do with hacking
shut up
lol
my grandma surfs with fire wall
and you suckers think you”re cool and don”t dare going into the internet without a fire wall

He calls me girly and says only his grandma would use a firewall. I know that elder people are much more intelligent then younger, but I couldn”t let that rest. To see whether he really is a good hacker I lie and let everything as it is. I don”t have a firewall at all, only my router.
QUOTE

bitchchecker, a collegue showed me how to turn the firewall off. Now you can try again
bitchhacker can”t hack
> nice play on words ^^
wort man
bitchchecker: I”m still waiting for your attack!
how many times again he is no hacker
man do you want a virus
tell me your ip and it deletes your hard drive
lol ne give it up i”m a hacker myself and i know how hackers behave and i can tell you 100.00% you”re no hacker..^^
127.0.0.1
it”s easy
lolololol you so stupid man you”ll be gone
and are the first files being deleted
mom…
i”ll take a look

In panic I started the Windows Explorer, my heart beating faster. Had I under-estimated him?
QUOTE
don”t need to rescue you can”t son of a bitch
that”s bad
elch you idiout your hard drive g: is deleted
yes, there”s nothing i can do about it
and in 20 seconds f: is gone

Yes, true, G: and F: were gone. Did I ever have them? Doesn”t matter, I did not have time to think, I was scared. bitchchecker was comforting me with a music tip.
QUOTE

tupac rules
elch you son of a bitch your f: is gone and e: too

Drive E:? Oh my god… All the games are there! And the vacation pictures! I instantly take a look. Everything still there. But the hacker said it was deleted….

Or isn”t it happening on my computer?

QUOTE
and d: is at 45% you idiot lolololol
why doesn”t meta say anything
he”s probably rolling on the floor laughing
> ^^
your d: is gone
go on BITCH

The guy is good: My CD-drive is allegedly deleted! Bitchchecker turned my ancient disk sucker into a burner! But how did he do this? I”ll have to ask him. Some encourage him. He himself is giving advice how to avoid the disaster on my hard drives.
QUOTE

elch man you”re so stupid never give your ip on the internet
i”m already at c: 30 percent

Should I tell him he”s not attacking my computer?

QUOTE
* bitchchecker (~java@euirc-9ff3c180.dip.t-dialin.net) Quit (Ping timeout#)

Too late… It”s 20:22 when we get the last message of our hacker with the alias “bitchchecker”. We see that he has a “Ping timeout”. We haven”t seen him since then… must be the Daylight Saving Time.

lol

blogladooscuro @ gmail.com

(Visited 106 times, 1 visits today)

Etiquetas

PERFIL
Profile image

    Sigue a este bloguero en sus redes sociales:

  • twitter

Más posts de este Blog

  • Mundo

    LATAM CISO: Regional Cybersecurity Network

    [caption id="attachment_147" align="alignright" width="82"] @isitreallysafe[/caption] Under the auspices of Venable, LLP, a law and lobbying firm in Washington, D.C.,(...)

  • Mundo

    Rusia, ¿robando tráfico de Apple?

    [caption id="attachment_147" align="alignright" width="82"] @isitreallysafe[/caption] Según información publicada por BGPmon, Rostelecom, el más grande proveedor de conectividad ruso, estuvo(...)

  • Mundo

    LATAM CISO: Red de ciberseguridad a nivel regional

    [caption id="attachment_147" align="alignright" width="82"] @isitreallysafe[/caption] Bajo el auspicio de Venable, LLP, una firma de abogados y lobbying con sede(...)

  • Colombia

    Mi empresa fue hackeada: ¿reporto a la policía?

    [caption id="attachment_147" align="alignright" width="82"] @isitreallysafe[/caption] En el blog que publiqué hace unas semanas, titulado “De la cíberseguridad pasiva a(...)

Ver más

Lo más leído en Blogs

1

[caption id="attachment_1137" align="alignnone" width="1600"] Rubby Haddock en escena, en Las Leyendas(...)

2

En esta ocasión, una entrevista con una experta en relaciones públicas(...)

3

Dios nos habla por medio de nuestros sueños. Esta es una(...)

2 Comentarios
Ingresa aquí para que puedas comentar este post
  1. comentarios_law

    Esta historia es casi un mito, pero es bastante posible. He conocido una serie de personajes por internet que hacen de todo con tal de sobresalir e incluso se autocontagian de virus al tratar de conseguir contraseñas de hotmail jajja. Si quieren más historias, es mejor preguntarles a los miembros del CUT

    ——–

Reglamento de comentarios

ETCE no se responsabiliza por el uso y tratamiento que los usuarios le den a la información publicada en este espacio de recomendaciones, pero aclara que busca ser la sombrilla de un espacio donde el equilibrio y la tolerancia sean el eje. En ese camino, disponemos de total libertad para eliminar los contenidos que:

  1. Promuevan mensajes tipo spam.
  2. El odio ante una persona o comunidad por su condición social, racial, sexual, religiosa o de situación de discapacidad.
  3. Muestren o impulsen comportamientos o lenguajes sexualmente explícitos, violentos o dañinos.
  4. Vulneren o atenten contra los derechos de los menores de edad.

Además, tenga en cuenta que:

  • - El usuario registrado solo podrá hacer un voto y veto por comentario.
Aceptar
¿Encontraste un error?

Para EL TIEMPO las observaciones sobre su contenido son importantes. Permítenos conocerlas para, si es el caso, tomar los correctivos necesarios, o darle trámite ante las instancias pertinentes dentro de EL TIEMPO Casa Editorial.


Debes escribir el comentario
¡Gracias! Tu comentario ha sido guardado
Tu calificación ha sido registrada
Tu participación ya fue registrada
Haz tu reporte
Cerrar
Debes escribir tu reporte
Tu reporte ha sido enviado con éxito
Debes ser usuario registrado para poder reportar este comentario. Cerrar