Комментарии:
Hello Chuck how often is a woman is excepted in the hacking comunity`?
ОтветитьWhere can I hire a hacker to help me find my email password for pay ?
ОтветитьThat would be cool to see how to secure routers in those particular situations
ОтветитьWhat about if the pc you’re trying to mim attack is on Ethernet like for example my downstairs pc is connected to WiFi5ghz via Ethernet to router while my upstairs is wireless but still on wifi5ghz . Could I still detect it.
ОтветитьCan you share me your insta id.I need to talk
ОтветитьI'm your new subscriber bro.
I just want to know , is your "Network Chuck cloud browser" free❓.
I wanna access to Dark web
Hey Chuck! I'm just curious if you have a degree in IT sphere?
Ответить802.11w/WPA3
ОтветитьSir What is your name
Ответитьthis one will do it in a matter of minutes
Ответитьcan you go over Apples Pkl programming language and if a beginner should start looking into this ?
ОтветитьI have been dealing with being hacked since April 2023. I had Nord highest support and VPN and nothing worked. Devices and phones. I still haven't shook it all off but I am studying all about networking as of now. I believe I'm going to make a career change so I can help others once I am educated. Thank you for your content.
ОтветитьDr. Robotnik lookin' aaaaaaa
Ответитьskid
Ответитьuse vim you hippie
ОтветитьAny free recommend free vpn?
ОтветитьCan VPN protect you from all 3 WiFi hacks?
Ответитьsir i need web application password cracking course please my humbale request
Ответитьcain and abel isnt used anymore?
ОтветитьHow can I make the Python script combine just lowercase words? Pls help
Ответитьjesus you really just spent 13 minutes to just promote your sponsor?! you already hafve it in the intro and all in the comments and the video about section. just make a video and stop trying to make money every second. also after years of watching you....youre just a hipster insert for IT. nice work with the algorithm.
Ответитьdeatotize??? lol
ОтветитьCrazy.
Ответитьif you're victim to man in the middle, and then connect to VPN, or begin a subscription, doesnt the middle man just have a vpn connection now, which they spoof forward to you?
ОтветитьGood video dude. You can also edit other less complex WiFi devices into a type of a pineapple WiFi. And you CAN "check yourself" by verifying the WiFi you are connecting to and removing legacy ones. You can change PC settings so that you do NOT simply "connect" to non-safe wifi networks. You can also host DNS on your on PC and can hard code where you pull DNS info from, etc.
ОтветитьYour doppelganger is a cowboy from Texas in the show The Trust.
ОтветитьOr simply, ask the bartender for the wi-fi password on router! ;)
ОтветитьHelpful tutorial
Ответитьvery well made ad with a very misleading suggestion about the effectiveness of a vpn
ОтветитьSoo.. Buy a subscription to a GOOD mobile internet-provider(with surficial amounts of data ..and lock the phone to only use this provider!), so you don't need to connect to free Wi-Fi!!
Only use your own personal Wi-Fi, or maybe also close family/friends Wi-Fi(if you trust their security/knowledge about security) ..and remember to make sure, that your phone 'forgets' the previously used Wi-Fi-networks, that you don't use anymore!
'Free Wi-Fi', should be scrutinized/treated the same way, you would handle a public toilet! - It's toxic!
PLEASE MAKE A VIDEO HOW TO MAKE YOUR OWN LINUX DISTRO .....
ОтветитьPixie Dust attack can also be done easily on WPS enabled wifi routers to obtain the WPS Pin & then connect it. I do a lot of Pixie dust attacks on my rooted Android smartphone with a app named WPSApp Pro to do Pixie dust attack & connect through WPS Pin through WPS WPA TESTER Android app.
ОтветитьI think you need to redefine the word hipster and pro in your thumbnail. Hipster isnt a level. A hipster can still be a noob. And a pro is short for professional meaning you get paid for it. instead of pro its expert or master. read a dictionary plz.
Ответитьhi good day can you show us how to hack portable cctv using same wifi connection? thank you in advance i am very happy if you make one.. thank you and take care...
ОтветитьI've lived in Japan for the last 16 years. Some hospitals, for example, finally implemented computers instead of paper notebooks around 2013 or later - no joke. If you were evil, this is the place to sow your seeds. You can get lots of practice to become a pro.
Since I am a business owner, I am hyper-redundundant when it comes to security. I have a bada$$ router with its own security features and I a vpn installed on it, Then I have three vpn services, since some decide not to work after an update (looking at you Nord :/) and I make sure every device connects to a vpn once a person logs on, with a kill switch/kill app on every device as well - including phones.
I do other things, but one of yous might be my neighbor and I don't want to give all my secrets away.
Am I forgetting anything?
Hey, what’s your opinion on using VMs for a small software house? Few Windows VMs for web development, a couple of VMs IIS web server, one VM for SQL server, one VM for TrueNAS, one VM for Firewall OR should we use separate 1U server machines for each purpose?
ОтветитьThe music playing in the background of your video sounds a lot like the music in the game Exanima.
ОтветитьThanks for sharing your expertise so concisely and eloquently! Take care and all the best! 🙏
ОтветитьBest thing for me is NO WIFI anywhere for me. All hard wire d everything.
ОтветитьWhen they don't socialize it, steal someone else's.
GOP motto
The biggest hackers makes a social platform, then sells out the data to companies and agencies...
Ответитьman im a noob? lol
Ответитьyou dont even need a laptop btw a smartphone would suffice
Ответить