ATr0jan (@atr0jan) 's Twitter Profile
ATr0jan

@atr0jan

Gamer and Professional Day Dreamer

Gmail: atr0j4n(at)gmail
Discord: discord.gg/vHh3KjN
TikTok: tiktok.com/@atr0jan?

ID: 1092593412744888320

linkhttps://www.twitch.tv/atr0jan calendar_today05-02-2019 01:19:03

7,7K Tweet

461 Followers

743 Following

vx-underground (@vxunderground) 's Twitter Profile Photo

One way to differentiate a real nerd from a phony nerd is their appreciation of stuff For example, someone may share an idea, or proof-of-concept, which illustrates something which is unusual A nerd will appreciate it for it's documentation and appreciation that someone has

Rachel Tobac (@racheltobac) 's Twitter Profile Photo

Introducing: agentic purchasing power! Now with *your* hard earned dollars BUILT IN! No more waiting by the phone to get scammed, your AI agent can get hijacked by an injection attack & cost you thousands without any effort from you! Get hacked today! πŸ’Έ (chargebacks guaranteed)

vx-underground (@vxunderground) 's Twitter Profile Photo

Weird stuff going on. This is a CRAZY anime arc. I beg you to read this post. This shit is crazy. Check this shit out June 16th, 2025: Phrack Zine reports suspected offensive state-sponsored activity from China and/or North Korea targeting South Korea. They notify KR-CERT (Defense

Weird stuff going on. This is a CRAZY anime arc. I beg you to read this post. This shit is crazy.

Check this shit out

June 16th, 2025: <a href="/phrack/">Phrack Zine</a> reports suspected offensive state-sponsored activity from China and/or North Korea targeting South Korea. They notify KR-CERT (Defense
Dave W Plummer (@davepl1968) 's Twitter Profile Photo

The story of FCKGW-RHQQ2-YXRKT-8TG6W-2B7Q8. If you're not the type to pay for your software, you probably know this key. What you might not know is that I worked on the first version of Windows Product Activation, and this was our first major "hack". And yet, it wasn't a

The story of FCKGW-RHQQ2-YXRKT-8TG6W-2B7Q8.

If you're not the type to pay for your software, you probably know this key.  What you might not know is that I worked on the first version of Windows Product Activation, and this was our first major "hack".  

And yet, it wasn't a
LaurieWired (@lauriewired) 's Twitter Profile Photo

Open Source isn't going to help. There's a way to invisibly compromise all software. A perfect, self-replicating "sin" passed down for generations of compilers. It's not just theoretical, and Ken Thompson showed us how.

Travis Akers (@travisakers) 's Twitter Profile Photo

A message from a Kindergarten teacher: After forty years in the classroom, my career ended with one small sentence from a six-year-old: β€œMy dad says people like you don’t matter anymore.” No sneer. No malice. Just quiet honesty β€” the kind that cuts deeper because it’s

TracketPacer (@tracketpacer) 's Twitter Profile Photo

1) medium is separate from protocol. although the protocol flavors DO specify a medium, they are still separate entities. β€œethernet” != the cable 2) adding more wires infinitely will not give you infinitely faster speeds 3) yes, you could terminate the pair i took out into the

ATr0jan (@atr0jan) 's Twitter Profile Photo

This is why I hate that it's just normal to ship Data outside your network. I wish the norm was to have products that ran locally. Really does make you want to build it yourself. trufflesecurity.com/blog/removing-…