I am not interested in the drama about blackmailing. I would like to know how exactly was this done technically? The nitty-gritty of the code that was used or taken advantage of and how?
Like, if it's plsql, php, js, python, whatever and how?
Drama aside can any coding guy explain how exactly the TR phishing was done? The guy's writing is very difficult to understand.
I am not interested in the drama about blackmailing. I would like to know how exactly was this done technically? The nitty-gritty of the code that was used or taken advantage of and how?
Like, if it's plsql, php, js, python, whatever and how?
[9 Points] USPSDirect:
[2 Points] DerGumbi:
All done in COBOL. With a little bit of Scheme mixed in for good measure.
[-16 Points] DickCheeseKillah:
Nigga ain't no one going to give you that info. Stop begging you filthy peasant. Now apologize.
You might as well go ask your mom how she deep throats dicks so well. She'll tell you the same thing all of us will... Practice.