![]() ![]() Ok, two things… it sounds like you just want the people and use us as a power source for your own good, you have no good intention for any of us, you just want to be “great” for yourself! I’ll come off honest, want power” -xxmidnitexx I am not against your hacker’s group…just against the way their privacy is (potentially) endangered. We only seek admiration from those that are better than us. We don’t have to prove anything to anyone but ourselves, as hackers. We believe in “knowledge is power” and freedom. I admire your vision, but hackers are people of the shadows by definition. (If this all seems like a longshot, unlikely story, read “The art of deception” by Kevin Mitnick…you will be startled by how easily people can be deceived) #Phx prodigy hacks cracker#Of course said cracker could find that information someplace else, but the effort in doing so would be greater. Giving such information creates a potential risk. The internet is no safer than the amount of time required to find the data. I could easily come into Prodigy and, using the personal info found there, put the police off my trails and possibly accuse some innocent person who happens to know what XSS is… I am being searched by police for stealing some money from some accounts. ![]() ![]() I will offer the simplest possible scenario here: The requirements: a computer, a Skype account, and the will to force the name Prodigy into the minds of the dim.īecause, friend, no matter your purpose, giving confidential information such as name, age, sex, etc… can be used (if not by you then by someone who could access such data) for any kind of purposes. If you share my vision for this underground world, if you want what I desire then please be so kind as to reply back to this thread and give me your name, age, gender, and Skype name. I want to give them a group of highly trained individuals in the art of hacking that they won’t soon forget. I want people to say the name with respect, fear, and admiration. I want everyone to join Prodigy, hacking skill or not. I don’t want separation to sprout from this proposal. I no longer want the most talented people I have ever seen being cast in the shadows on a website that no one even knows about. I want this whole thing taken to a whole new level. I don’t want sensitive data, I don’t want to hack bank accounts, credit cards, or whatever else “black hat hackers” want. Those famous words have been said in the past once or twice, and look how far they got the people who used them. Compared to some, I have minimal computer knowledge.īut what I do have, is a dream. I don’t phish, dDos, or much of the sort. The Assistant's computer can be hacked to lure the Manager to the upstairs conference room.Look. #Phx prodigy hacks code#The SCRS: The computer in the checkpoint can be hacked to disable the metal detectors without needing to search for the power box.īlack Dusk: The computer inside the operations room can be hacked to give the vault code, which makes you skip interrogating the head tech for it.Ĭoncept: The Manager's and Maddox Grey's computers can be hacked to acquire the Vault Code and the Box Number respectively. #Phx prodigy hacks password#Alternatively, when hacking the computer or using the password provided by Rivera, the time for the hack to complete will be reduced by the Hacker's speedhack perks. The Scientist: The computer in the server room can be hacked without the use of a USB or password. The Withdrawal: The computer in the manager's office can be tampered with to attract an employee over to the room. If the alarm is raised, Plan A can still be carried out via a slow hack in both the control centers. The Deposit: The Manager's and Maddox Grey's computers can be hacked to acquire the Vault Code and the Box Number respectively. The combination will also be provided for fast access. The Financier: A computer can be hacked to find the location of the safe. The Auction: The server room computer can be hacked instead of searching the bank records for the employee. The Killhouse: A computer can be hacked to disable the sensors below Legend difficulty. The Lockup: The police captain's computer can be hacked without needing to search their drawers for the password. The Setup: The servers can be hacked without needing to find the password.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |