Hackers & coders

 

Bronze Member
Username: Peeps365

Post Number: 55
Registered: Feb-09
c/p yates

This is a great info about coders and hackers that explain the difference between them.

now that we are almost completely n3 people are begging the coders to get going.... here are the facts...

- A coder does not crack N3... that takes a hacker... until n3 is hacked the coders can do nothing but wait like you and I...

- Hackers get paid in large sums of money one time to provide a hack to encryption like n1, n2 and n3... coders are on salary to write codes whenever ecms come out....

- Hackers use computers and acid and electron microscopes... coders use keyboards and copious amounts of coffee.....

- IKS does not involve coders... it involves computer specialists who hook up a network to share a card using a server.... coders do, however, get involved in writing bin files for the boxes that include IKS capability....

Once it is hacked, ALL the coders will be on it..
 

Platinum Member
Username: Nydas

Post Number: 15370
Registered: Jun-06
That is well informed post.
 

Silver Member
Username: Perycles2005

Post Number: 103
Registered: Mar-05
Yet don't say anything about the time it will take approx. to get the new N3 descrambled...at least some one give us an estimate?...Nalin...I remember last time it took about one month and a half for N2...will it take same time...what do you think?...thanks for the info...
 

Gold Member
Username: Riconissan

Post Number: 1428
Registered: Feb-09
Hackers are looking at it. Even after they steal the code from DN it will take a while to make it work in FTA box.
 

Gold Member
Username: Lol

Post Number: 1511
Registered: Sep-06
BS everyone knows
hackers have Goatees
and
Coders have slanted eyes
 

Gold Member
Username: Riconissan

Post Number: 1431
Registered: Feb-09
Paul,
Is that an attack? didn't you read any of Jackee's posts.
 

Gold Member
Username: Lol

Post Number: 1512
Registered: Sep-06
jackee chan ?
 

Platinum Member
Username: Nydas

Post Number: 15373
Registered: Jun-06
Perycles2005: This time it is more complicated. On th eother hand, the hackers have more experience, better tools and probably better pay. Based on those criteria, it would take about 1-3 months.
 

Gold Member
Username: Lol

Post Number: 1516
Registered: Sep-06
Upload
 

Gold Member
Username: Gregraf

Post Number: 3037
Registered: Dec-07
Paul you are so naughty.
 

Silver Member
Username: Jojogun

Fairfield, CA United States

Post Number: 524
Registered: Apr-06
kid, thank you very much for that informative post. those are certainly things i did not know.
 

Silver Member
Username: Creek

Smithtown, New York

Post Number: 520
Registered: May-06
Watch how hackers use acid and electron microscope in the video below.
http://www.wired.com/politics/security/news/2008/05/tarnovsky?currentPage=all
 

Silver Member
Username: Guanajuatos_best

Post Number: 249
Registered: Jul-07
That video is so cool!!!!!!!!!!!!!!!!!!
 

Bronze Member
Username: Peeps365

Post Number: 56
Registered: Feb-09
we should be able to make this a sticky along with creek's video that would be nice...............ha ha ha
 

Silver Member
Username: Applebees

Post Number: 131
Registered: Oct-08
good finding.......keep'em coming

Upload
« Previous Thread Next Thread »



Main Forums

Today's Posts

Forum Help

Follow Us