Bronze Member Username: Peeps365Post Number: 55 Registered: Feb-09 | c/p yates This is a great info about coders and hackers that explain the difference between them. now that we are almost completely n3 people are begging the coders to get going.... here are the facts... - A coder does not crack N3... that takes a hacker... until n3 is hacked the coders can do nothing but wait like you and I... - Hackers get paid in large sums of money one time to provide a hack to encryption like n1, n2 and n3... coders are on salary to write codes whenever ecms come out.... - Hackers use computers and acid and electron microscopes... coders use keyboards and copious amounts of coffee..... - IKS does not involve coders... it involves computer specialists who hook up a network to share a card using a server.... coders do, however, get involved in writing bin files for the boxes that include IKS capability.... Once it is hacked, ALL the coders will be on it.. |
Platinum Member Username: NydasPost Number: 15370 Registered: Jun-06 | That is well informed post. |
Silver Member Username: Perycles2005Post Number: 103 Registered: Mar-05 | Yet don't say anything about the time it will take approx. to get the new N3 descrambled...at least some one give us an estimate?...Nalin...I remember last time it took about one month and a half for N2...will it take same time...what do you think?...thanks for the info... |
Gold Member Username: RiconissanPost Number: 1428 Registered: Feb-09 | Hackers are looking at it. Even after they steal the code from DN it will take a while to make it work in FTA box. |
Gold Member Username: LolPost Number: 1511 Registered: Sep-06 | BS everyone knows hackers have Goatees and Coders have slanted eyes |
Gold Member Username: RiconissanPost Number: 1431 Registered: Feb-09 | Paul, Is that an attack? didn't you read any of Jackee's posts. |
Gold Member Username: LolPost Number: 1512 Registered: Sep-06 | jackee chan ? |
Platinum Member Username: NydasPost Number: 15373 Registered: Jun-06 | Perycles2005: This time it is more complicated. On th eother hand, the hackers have more experience, better tools and probably better pay. Based on those criteria, it would take about 1-3 months. |
Gold Member Username: LolPost Number: 1516 Registered: Sep-06 | |
Gold Member Username: GregrafPost Number: 3037 Registered: Dec-07 | Paul you are so naughty. |
Silver Member Username: JojogunFairfield, CA United States Post Number: 524 Registered: Apr-06 | kid, thank you very much for that informative post. those are certainly things i did not know. |
Silver Member Username: CreekSmithtown, New York Post Number: 520 Registered: May-06 | Watch how hackers use acid and electron microscope in the video below. http://www.wired.com/politics/security/news/2008/05/tarnovsky?currentPage=all |
Silver Member Username: Guanajuatos_bestPost Number: 249 Registered: Jul-07 | That video is so cool!!!!!!!!!!!!!!!!!! |
Bronze Member Username: Peeps365Post Number: 56 Registered: Feb-09 | we should be able to make this a sticky along with creek's video that would be nice...............ha ha ha |
Silver Member Username: ApplebeesPost Number: 131 Registered: Oct-08 | good finding.......keep'em coming |