tag:blogger.com,1999:blog-6417275079333363490.post3553043821161715747..comments2023-07-22T02:53:13.759-07:00Comments on Greg Martin's blog - InfoSecurity 2.0: Why you don't steal from a hackerGreg Martinhttp://www.blogger.com/profile/11631833625444365559noreply@blogger.comBlogger8125tag:blogger.com,1999:blog-6417275079333363490.post-33284587343094802892011-08-12T12:48:29.527-07:002011-08-12T12:48:29.527-07:00Good for you and I'm glad you got your Macbook...Good for you and I'm glad you got your Macbook Pro back. I just hope everyone else who got stuff stolen from them in the riots get's it back.<br /><br />Just out of curiosity do you know what sort of penalty this thief will face?Ianhttp://instantcarinsuranceonline.comnoreply@blogger.comtag:blogger.com,1999:blog-6417275079333363490.post-4137061063692835292011-08-12T12:00:46.269-07:002011-08-12T12:00:46.269-07:00EVERYONE who says someone else is or isn't a h...EVERYONE who says someone else is or isn't a hacker simply doesn't know what a "hacker" really is.<br /><br />Good job - too bad there's not more like you.<br /><br />I can't believe these comments - you would think that calling someone "not a hacker" got you karma, upvotes, or a girlfriend with how many commoners here are doing it.dblagbrohttps://www.blogger.com/profile/11043834070259544863noreply@blogger.comtag:blogger.com,1999:blog-6417275079333363490.post-6526066409026874702011-08-12T11:33:39.880-07:002011-08-12T11:33:39.880-07:00@cazlab: By your standards, can you name one "...@cazlab: By your standards, can you name one "hacker" through out the history? The closest I get is Woz. But I don't think he buildt his own chips or still uses that computer...dexternoreply@blogger.comtag:blogger.com,1999:blog-6417275079333363490.post-73680138470709528682011-08-12T11:32:07.855-07:002011-08-12T11:32:07.855-07:00I am a hacker and this is my manifesto???I am a hacker and this is my manifesto???Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-6417275079333363490.post-41395833950630367732011-08-12T11:24:40.475-07:002011-08-12T11:24:40.475-07:00Yes, let's shout out about how Prey is great e...Yes, let's shout out about how Prey is great everytime someone steals a mac, so that everyone knows about it and is able to avoid it next time.<br /><br />TLDR: good story bro.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-6417275079333363490.post-8073227748254600772011-08-12T11:08:24.529-07:002011-08-12T11:08:24.529-07:00Do you know how I know you're not a hacker? Be...Do you know how I know you're not a hacker? Because you posted a Facebook screenshot of an iPhone screenshot of an email instead of just posting the email.stevefrenchnoreply@blogger.comtag:blogger.com,1999:blog-6417275079333363490.post-51231178996774861762011-08-12T11:05:15.330-07:002011-08-12T11:05:15.330-07:00Clearly some commenters are upset that their lapto...Clearly some commenters are upset that their laptops weren't stolen.Charles Fedukehttps://www.blogger.com/profile/06057631290185370035noreply@blogger.comtag:blogger.com,1999:blog-6417275079333363490.post-85268295202050287362011-08-12T11:03:38.139-07:002011-08-12T11:03:38.139-07:00I love how the anonymous idiots come out of the wo...I love how the anonymous idiots come out of the woodwork. Using a monitoring server doesn't make you any less of a hacker. Check out his blog history (years of it) - he's clearly well versed in technology and would be considered a "hacker". <br /><br />Making a monitoring app is trivial - it's a job of a software developer (which I am), not a hacker. Hacker's can use any OS and any software they wish to aid their efforts. Stop being tards. You're not less of an engineer because you're driving someone else's car.Anonymousnoreply@blogger.com