Skip to main content

一个业余间谍的自我修养

发信人: scsina (scsina), 信区: Military
标  题: 一个业余间谍的自我修养
发信站: BBS 未名空间站 (Sat Jun 14 18:46:04 2014, 美东)

言重了。也未必就是间谍。如果你对敏感的东西感兴趣,学会自我保护,不要稀里糊涂
上了钩就是了

退一万步,就算你想买点东西,可能有带回中国的想法,也不能跟人说,更不能跟卖家
说。你可以在网上购买,东西到手,给个好评(。。。)然后立刻闪人。在地下室放个
半年,fbi监视也监视烦了,再想想怎么运出去。或者直接就不管了,留着收藏。老子
就是逗你玩的。浪费fbi的人力物力也是爱国不是

实物,电子产品,想带回中国,方法多了去了。(专业的做法,拆碎了,割成一片一片
的,反响测绘能复原。而且拆散了可以分几次带或者邮寄,再混一些其它东西,没人能
看出来那原本是什么。但问题是你不够专业,拆的时候会把关键部分搞坏。。。。)就
不要想着让人帮忙邮寄了。现在网上的,十个九个是cia反间谍,剩下一个是吹牛b没准
还是爱国者。东西还没到手就去跟人讨论邮寄的,纯粹就是没事找抽,fbi入狱一条龙
服务,哈哈

软件代码什么的,随身带的就是傻逼了。。。。云技术这么发达,你整个网盘不行?什
么,能监视你上传?不懂得隐藏文件名加密压缩?老子上传的文件都几个T了,中间有
几个G,你们懂得,虽然也不是什么重要东西,但我回国的时候绝不会带在身上的。想
监视?只要老美愿意在那几个T的毛片里面搜敏感文件,还有闲心陪我解密,我奉陪

说实话,虽然俗话说,淹死的都是半吊子,但最近几个华人间谍案,貌似淹死的都是外
行,看着都心痛。这都什么人啊。连最基本的训练,比如反测谎仪反审讯都没有的人,
就不要碰这行了,心里有鬼,你连审讯关都过不了的。良民看到违禁品,最好的反应,
就是离得远远的。学生什么的来美国,学好专业,就是最好的报效祖国方式了
http://gengwg.blogspot.com/

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...