Hacker Newsnew | past | comments | ask | show | jobs | submit | more RVRX's commentslogin

https://www.rvrx.dev/blog/ Early career Dev, just redid my website and started my blog. Newest post was on implementing a safe Wireguard Kill-Switch on Ubuntu


FYI, Had trouble getting to your resume. It appears the link you gave is missing the "www." and there is no auto-redirect from "martyrudolf.com" to "www.martyrudolf.com"


Love the ASCII art and whole design of your homepage!


Thanks!


Are you interested in hiring any Junior/Entry lvl devs?


The only non-remote Engineering role is "New Grad 2023 | Software Engineer - Backend ", (even though the frontend version of the role is remote) is that a mistype or intentional?


we're open to remote for all roles


Mullvad offers flat rate $5 (no matter 1 month or 12 months or 120 months) and never have any sales so I'm surprised to see these[1] prepaid amazon cards ARE offering discounts: 12mo @ $4.75/mo & 6mo @ $4.83/mo esp. when these are /physical/ code-card purchases

[1] https://www.amazon.com/Mullvad-VPN-Devices-Protect-Security/...


They do provide a nominal discount if you pay with Bitcoin, though I assumed that had something to do with the lack of payment processor fees so it doesn't necessarily explain why the Amazon prices are different.


They don't have any other rate for you and me as individuals, but I'm sure they offer them slightly cheaper for resellers like Mozilla and Malwarebytes.

Those resellers then charge about the same price as Mullvad, but get to keep a piece of that as profit.


Probably bought with stolen credit cards and being resold.


Nope, those scratch cards are listed on their website. They're legit: https://mullvad.net/en/help/partnerships-and-resellers/


IMO most of their customer demographic is the edgy online teenager who wants to mess with someone on the internet, not adults or companies going after any businesses or the like.

Just look at the ADs to these sites that are super flashy and cool to cater to these teens

Edit: Example ADs: https://i.imgur.com/PjqG7dC.gif https://i.imgur.com/ebp4ERm.gif https://i.imgur.com/kTM3fAA.gif


That's ok. I wouldn't necessarily advocate jail time for them but there should be real consequences. Lots of community service or internet usage resrictions would help them learn that people aren't fucking around about this.


Its a known tactic in competitive online games where you can see your opponents IP address to try to "boot them" via DDOS their local IP so they go down or have lessened performance and you win the match. Also harass or shake down kids they think have money. Fortunately the vast majority of people have dynamic IPs, and could likely get a non effected one by just unplugging their router and letting it get a clean IP.

Because of this, a lot of games companies will try to mask the actual IP of the other users now, and Steam has tooling for games they support for devs on their platform.


>that people aren't fucking around about this.

99% of ddos attacks aren't that serious


99% of community service sentences aren't that serious either.


The target of the 'not that serious' DDOS could be a hospital or someone requesting emergency services over voip.


I said 99%.


I remember people used them for DDoSing in high rated WoW Arena matches through IPs leaked through Skype.


Yeah ddosing and gaming have a long history. Over a decade ago these type of services were very popular on other games like Halo, CSGO, & runescape. I was pretty active in the runescape PVP community and around ~2010 onwards tons of people were using these types of services to ddos other players/rival teams & even the game servers themselves. It was especially bad on runescape because ddosing had a financial motive (killing someone for their gear that is worth real money is earlier when they lose connection). At the time hiding your IP wasn't as easy as it is now (Skype was super popular like you pointed out, but so were things like teamspeak & 3rd party forums).



Game development is business. The "messing" does real damage with real costs.


TBF these sites have been up for years, I recognize some from >decade ago, so it took quite some time for the law to catch up to them. They've probably taken in quite a bit of cash since their inception.


Back when I was a teenager I used to come across these sites all the time when playing with Skype-to-IP revolvers. I just checked, and I'm surprised Google actually still shows these sites when you search for them. Most of them have partner links to these DDoS sites, many of which are on this list of takedowns.


iTerm2 actually offers nice interfacing with tmux. If you run `tmux -CC` it will start a tmux session that iTerm abstracts away letting you split and switch panes as you normally would in iTerm, but still allowing you to join the tmux session on another terminal.

https://iterm2.com/documentation-tmux-integration.html


That looks interesting, I’ll have to give that a try thanks!


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: