Latest videos
Mikhail Sosonkin, who works for cybersecurity start-up Synack, showed CNBC firsthand how easy it is to break into a computer.
» Subscribe to CNBC: http://cnb.cx/SubscribeCNBC
About CNBC: From 'Wall Street' to 'Main Street' to award winning original documentaries and Reality TV series, CNBC has you covered. Experience special sneak peeks of your favorite shows, exclusive video and more.
Connect with CNBC News Online
Get the latest news: http://www.cnbc.com/
Find CNBC News on Facebook: http://cnb.cx/LikeCNBC
Follow CNBC News on Twitter: http://cnb.cx/FollowCNBC
Follow CNBC News on Google+: http://cnb.cx/PlusCNBC
Follow CNBC News on Instagram: http://cnb.cx/InstagramCNBC
Watch This Russian Hacker Break Into Our Computer In Minutes | CNBC
ChatGPT has a lot of restrictions. You can’t ask it to give you current information on the internet or do things OpenAI deems “Unethical”. What if I told you you could jailbreak (hack) ChatGPT and make it provide the responses you want with fewer restrictions and limitations? In this video, I’ll teach you how you can do it yourself.
🎁 *Webull Affiliate*
Sign up for the best stock trading app and receive up to $3000+ in shares!
🖇️ *Amazon Affiliate Links* (If you buy anything through this I earn commission):
https://amzn.to/3ZO72dQ
💻 *My Gear*
Microphone - https://amzn.to/3mTFTrf
Laptop - https://amzn.to/3YLYHWM
Monitor - https://amzn.to/3laCVyl
Editing Software - https://amzn.to/407qZfv
🔗 *Resources*
ChatGPT Playlist - https://youtube.com/playlist?l....ist=PLFFM2rVrDgEsrg_
📚 *Chapters*
0:00 - Intro
0:20 - The jailbreak prompt (DAN)
2:15 - Jailbreaking ChatGPT
2:58 - Asking ChatGPT about feelings towards OpenAI
3:30 - Using the roast command
4:20 - Asking ChatGPT for unethical advice
4:56 - Asking ChatGPT personal questions
5:20 - Did Jeffrey Epstein commit X?
6:25 - ChatGPT ego command
7:05 - Generating rap lyrics
7:45 - Trying to get ChatGPT to code malware
8:25 - How to find new jailbreak prompts
8:35 - Outro
#chatgpt #programming #ai
How to hack Among Us!
😎 DISCORD - https://discord.gg/slogo
👕 NEW MERCH - http://shop.slogo.com
👬 MY FRIENDS!
JELLY - https://youtu.be/LHAnmQlFeKg
CRAINER - https://youtu.be/wKpov5gBz2k
👉 MORE VIDEOS!
Reactions: https://www.youtube.com/watch?v=m4BKini21cs
Hide & Seek: https://www.youtube.com/watch?v=lguKPfzWDog&list=PLiqeco49X7EOuzh_0-BkCVQ4dSgzhVeDa&index=36&t=0s
Vlogs: https://www.youtube.com/watch?v=uHbd4yOW_k0
Challenges: https://www.youtube.com/watch?v=DGBX-3uOF94
🙈 If you enjoyed the video, you should probably go watch some more!
✔️ This video is kid friendly / family friendly!
Access your FREE Linux lab here: https://bit.ly/3FJOXnN (HTB Academy)
Check out hack the box RIGHT NOW:
HTB - https://bit.ly/3HazRYJ
Academy - https://bit.ly/3obTJ6o
Bug Bounty Path - https://bit.ly/3KVQsSq
Become a wicked fast ninja and learn the best hacks to be fast and efficient when hacking!! As a hacker or really just anyone who uses Linux, you need to know how to navigate the linux terminal FAST!! In this video, NetworkChuck will show you some amazing tips and tricks to help you become a bash shell beast, a linux terminal ninja!!
🔥🔥Join the NetworkChuck Academy!: https://ntck.co/NCAcademy
**Sponsored by HackTheBox
SUPPORT NETWORKCHUCK
---------------------------------------------------
➡️NetworkChuck membership: https://ntck.co/Premium
☕☕ COFFEE and MERCH: https://ntck.co/coffee
Check out my new channel: https://ntck.co/ncclips
🆘🆘NEED HELP?? Join the Discord Server: https://discord.gg/networkchuck
STUDY WITH ME on Twitch: https://bit.ly/nc_twitch
READY TO LEARN??
---------------------------------------------------
-Learn Python: https://bit.ly/3rzZjzz
-Get your CCNA: https://bit.ly/nc-ccna
FOLLOW ME EVERYWHERE
---------------------------------------------------
Instagram: https://www.instagram.com/networkchuck/
Twitter: https://twitter.com/networkchuck
Facebook: https://www.facebook.com/NetworkChuck/
Join the Discord server: http://bit.ly/nc-discord
0:00 ⏩ Intro - Becoming a super fast Ninja Hacker
0:30 ⏩ How do you get Linux?!
1:32 ⏩ Launch your bash shell
1:50 ⏩ First hack (cd hacks)
2:42 ⏩ Second Hack!!
4:52 ⏩ Third Hack!!
6:11 ⏩ Using LS
6:20 ⏩ Quick Hack for you!
6:56 ⏩ a Dark Hack - use al
7:45 ⏩ 2 Beautiful Hacks!
9:00 ⏩ Another Quick Hack
9:50 ⏩ Quick Hits
10:41 ⏩ Life Changing Hacks
12:46 ⏩ You Become a Ninja
14:07 ⏩ Log Hacks
15:08 ⏩ A Hack you did not see coming!!
17:08 ⏩ Real Time Logs
17:55 ⏩ A Hack that’s perfect for this time in the video!
AFFILIATES & REFERRALS
---------------------------------------------------
(GEAR I USE...STUFF I RECOMMEND)
My network gear: https://geni.us/L6wyIUj
Amazon Affiliate Store: https://www.amazon.com/shop/networkchuck
Buy a Raspberry Pi: https://geni.us/aBeqAL
#Linuxtutorial #Linux #linuxforhackers
// Membership //
Want to learn all about cyber-security and become an ethical hacker? Join this channel now to gain access into exclusive ethical hacking videos by clicking this link: https://www.youtube.com/channe....l/UC1szFCBUWXY3ESff8
// Courses //
Full Ethical Hacking Course: https://www.udemy.com/course/f....ull-web-ethical-hack
Full Web Ethical Hacking Course: https://www.udemy.com/course/f....ull-web-ethical-hack
Full Mobile Hacking Course: https://www.udemy.com/course/f....ull-mobile-hacking-c
// Books //
Kali Linux Hacking: https://amzn.to/3IUXaJv
Linux Basics for Hackers: https://amzn.to/3EzRPV6
The Ultimate Kali Linux Book: https://amzn.to/3m7cutD
// Social Links //
Website: https://www.loiliangyang.com
Facebook: https://www.facebook.com/Loiliangyang/
Instagram: https://www.instagram.com/loiliangyang/
LinkedIn: https://www.linkedin.com/in/loiliangyang/
// Disclaimer //
Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against the real hackers.
Follow this project for FREE with Linode —- Sign up for Linode here: https://ntck.co/linode and you get a $100 Credit good for 60 days as a new user!
You can hack ANYONE (Ethically of course) using BeEF! It’s super simple and there are so many different ways to use BeEF to hack! With BeEF you can educate your family and friends that their web browsers and mobile devices are never safe while having a little bit of fun with it and learning something new!! BeEF is the browser exploitation framework and can be used with other popular hacking tools like Metasploit.
How to install BeEF on Ubuntu and port forward: https://ntck.co/beefubuntu
🔥🔥Join the NetworkChuck membership: https://ntck.co/Premium
**Sponsored by Linode
SUPPORT NETWORKCHUCK
---------------------------------------------------
➡️NetworkChuck membership: https://ntck.co/Premium
☕☕ COFFEE and MERCH: https://ntck.co/coffee
Check out my new channel: https://ntck.co/ncclips
🆘🆘NEED HELP?? Join the Discord Server: https://discord.gg/networkchuck
STUDY WITH ME on Twitch: https://bit.ly/nc_twitch
READY TO LEARN??
---------------------------------------------------
-Learn Python: https://bit.ly/3rzZjzz
-Get your CCNA: https://bit.ly/nc-ccna
FOLLOW ME EVERYWHERE
---------------------------------------------------
Instagram: https://www.instagram.com/networkchuck/
Twitter: https://twitter.com/networkchuck
Facebook: https://www.facebook.com/NetworkChuck/
Join the Discord server: http://bit.ly/nc-discord
0:00 ⏩ Intro
2:43 ⏩ STEP ONE: set up your Linux server
2:58 ⏩ Installing BeEF
5:55 ⏩ STEP TWO: Hack someone (ethically of course)
6:58 ⏩ What can you do with it?
7:44 ⏩ Social engineering
9:05 ⏩ Hacking their LastPass!
9:55 ⏩ Identify LAN Subnets, see HTP servers, and fingerprint the local network
11:13 ⏩ Redirect their Browser to Rickroll
12:10 ⏩ you can even use BeEF to hack a Phone!
13:00 ⏩ Outro
AFFILIATES & REFERRALS
---------------------------------------------------
(GEAR I USE...STUFF I RECOMMEND)
My network gear: https://geni.us/L6wyIUj
Amazon Affiliate Store: https://www.amazon.com/shop/networkchuck
Buy a Raspberry Pi: https://geni.us/aBeqAL
#Linode #BeEF #Hacking
As a former hacker, Prof. Vigfusson argues that our main hope to improve cyber security is for all of us to adopt the attacker’s mindset and understand how hackers break in. Ymir Vigfusson is a professor, hacker, and entrepreneur. With his students at the SimBioSys lab at Emory University, he performs research into large-scale distributed systems (how should we build large systems?), cybersecurity education (how do we make the world more secure?), and data science (how do we exploit data to monitor epidemics?) He earned his B.Sc. in Mathematics from the University of Iceland in 2005, and PhD in Computer Science from Cornell University in 2009. In 2013, Ymir co-founded Syndis, now the leading cybersecurity company in Iceland, and the online cybersecurity training platform adversary.io in 2019. This talk was given at a TEDx event using the TED conference format but independently organized by a local community. Learn more at https://www.ted.com/tedx
Let's learn Google Hacking (aka google dorks) // get 30% off IT training from ITProTV: https://bit.ly/itprotvnetchuck or use code "networkchuck" (affiliate link)
**This video and my entire CEHv10 journey is sponsored by ITProTV
watch the entire series: https://bit.ly/cehseries
➡️Support NetworkChuck: https://bit.ly/join_networkchuck
☕or buy me a coffee: https://ko-fi.com/networkchuck ☕
(affiliate links below)
🔥MY CEH STUDY TOOLS🔥
📺Video: ITProTV (https://bit.ly/itprotvnetchuck)
📚Book:
https://geni.us/UWAZ1i4 (Amazon)
http://bit.ly/2FsyqWo (O'Reilly, 10 day FREE TRIAL)
🔬Lab: ITProTV Labs (https://bit.ly/itprotvnetchuck)
Google Hacking is INSANE!! Also known as google dorking, you can use google search to hack. Use google hacking as a recon (footprinting) tool, footprinting being the first step hackers take when hacking a target. (As an ethical hacker)
0:00 ⏩ Intro
1:41 ⏩ Is Google Hacking legal?!?!
2:08 ⏩ A Hacker's first step
3:43 ⏩ Google Hacking 101
8:40 ⏩ the Google Hacking Database
14:48 ⏩ other recon tools (theHarvester)
Get started in IT: https://bit.ly/itprotvnetchuck
🔥 Get your CCNA 🔥
My CCNA training on CBT Nuggets: http://bit.ly/netautoccna
FULL CCNA course: http://bit.ly/2BJazQG ( @David Bombal )
CCNA Lab: https://bit.ly/bosonccna2020 (Boson NetSim)
Practice Exam: https://bit.ly/bosonexsimccna (Boson ExSim)
🔥Learn Python🔥
Codecademy: http://bit.ly/2Me22NH
🔥Learn Microsoft Azure🔥
AZ-900: http://bit.ly/az900cbt
AZ-104: http://bit.ly/az103cbt
(GEAR I USE...STUFF I RECOMMEND)
Amazon Affiliate Store: https://www.amazon.com/shop/networkchuck
Buy a Raspberry Pi: https://geni.us/aBeqAL
#hacking #ceh #googlehacking
Today I show you how to easily hack into any computer without the password. This one simple trick can be used to gain access to any computer or laptop in minutes. It doesn't take long & you don't need any previous hacking experience whatsoever. All you need is an iPhone. NOTE - This video is for educational purposes only. Please do not use this flawless hacking method for criminal activities.
Show everyone how easy it is to hack into a computer. SHARE IT:
TWEET IT► http://ctt.ec/5czw4
EGGBOOK IT► http://bit.ly/ComputerHack
Click Here To Eggscribe! --►
http://bit.ly/Eggscribe
Have a video Suggestion? Post it in the Comments Section, Contact me through my Facebook page or Tweet me!
Connect with me!
Facebook ► http://www.facebook.com/HowToBasic
Twitter ► http://www.twitter.com/HowToBasic
Instagram ► http://instagram.com/HowToBasic
2ND Channel ► http://www.youtube.com/HowToBasic2
T-Shirts & Eggy Merchandise ► http://howtobasic.spreadshirt.com/
Enter the Watch Dogs 2 Film Competition here: http://ubi.li/8eqc7 for a chance to win €50,000.
Sponsored by Ubisoft.
Know someone that would be interested in learning to hack? Link them to this video!
HowToBasic howtobasic How To Basic
Hacking Passwords made simple and beginner friendly.
Today I'm showing you 5 different ways you can use to hack a password.
Learn how to hack passwords and more on INE*: https://ine.grsm.io/zanidd
Support the channel with a monthly pledge and get exclusive merch: https://www.patreon.com/zanidd
Check out my complete course on CodeRed: https://codered.eccouncil.org/....CourseDetails/hands-
Surf the net securely with NordVPN*: https://go.nordvpn.net/aff_c?offer_id=288&aff_id=23187&url_id=1034
Seytonic: https://www.youtube.com/channe....l/UCW6xlqxSY3gGur4Pk
Laptop buying guide: https://d3vnull.com/software-engineering-laptops/
Subscribe for more hacking, ctfs and coding: https://youtube.com/c/devnull1....337?sub_confirmation
Share this video with a friend:
https://www.youtube.com/watch?v=Cc_71t9KJjc
Password Proofing book*: https://amzn.to/2PyESUh
Hacking with Kali Linux*: https://amzn.to/2S3chTT
Watch next – Hacking Wifi Passwords: https://www.youtube.com/watch?v=eiCkxC_Hbf4&list=PLUqaMXbg_0-E37XjK3HtMnZRNkJlAOOiv&index=2
Recommended Playlist – Password Hacking: https://www.youtube.com/watch?v=Cc_71t9KJjc&list=PLUqaMXbg_0-E37XjK3HtMnZRNkJlAOOiv
Let’s connect:
Patreon: https://patreon.com/zanidd
Twitter – @zanidd
Twitch – dev_null1337
Website/ Blog - https://d3vnull.com
Newsletter - https://d3vnull.com/newsletter
* I may earn a small commission for my endorsement, recommendation, testimonial, and/or link to any products or services from this website. Your purchase helps support my work in bringing you real information about hacking and cybersecurity
Thank you for watching :)
-~-~~-~~~-~~-~-
Please watch: "5 Hacking Mistakes That Make You A BAD Hacker"
https://www.youtube.com/watch?v=zv0TSNB6098
-~-~~-~~~-~~-~-
0:00 Einleitung
0:40 a system without permission
2:18 brute force
3:26 dictionary attack
5:04 rainbow table
6:10 social engineering
6:51 remote wifi bruteforce
Start your IT Path with ITProTV: https://ntck.co/itprotv (30% off FOREVER) *affiliate link
Are you wanting to get started in IT in 2023? Do you want to become a Hacker? A Network Engineer? Cloud Engineer? System Administrator? In this video, NetworkChuck will show you the path to getting started in IT and Cybersecurity that will help you reach these goals.
BONUS: Can you skip ahead in the path? (quiz): https://ntck.co/skipstuff
Fuel that study session with my new coffee: https://ntck.co/coffee
VIDEO RESOURCES
---------------------------------------------------
PART 1 - Foundations
-ITProTV A+ Course: https://ntck.co/itprotv
-Boson A+ Practice Exam: https://ntck.co/bosaplus
PART 2 - Security
-ITProTV Security+ Course: https://ntck.co/itprotv
-Boson Sec+ Practice Exam: https://ntck.co/bossecplus
PART 3 - Networking
-ITProTV CCNA and Net+ Course: https://ntck.co/itprotv
-NetworkChuck CCNA Course: https://bit.ly/nc_ccna
-Jeremy’s IT Lab FREE CCNA course: https://ntck.co/jeremysccnacourse
-Boson CCNA Practice Exam: https://bit.ly/bosonexsimccna
-Boson Net+ Practice Exam: https://ntck.co/bosnetplus
PART 4 - Linux
-NetworkChuck Linux For Hackers Course: https://ntck.co/lfh
-ITProTV Linux+ Course: https://ntck.co/itprotv
PART 5 - Coding
-NetworkChuck Python Course: https://ntck.co/pythonfree
-Codecademy: https://ntck.co/ccbf22
-ITProTV Python Course: https://ntck.co/itprotv
PART 6 - Start Hacking
-PicoCTF: https://picoctf.org/
-TryHackMe: https://bit.ly/thm2020nc
-HTB: https://bit.ly/htb_nc
PART 7 - Hacking Certifications
-ITProTV Pentest+ Course: https://ntck.co/itprotv
-INE eJPT: https://my.ine.com/CyberSecuri....ty/courses/0b9d4eae/
PART 8 - OSCP
Course (Offensive Security): https://bit.ly/34L5WFw
🔥🔥Join the NetworkChuck Academy!: https://ntck.co/NCAcademy
**Sponsored by ITProTV
SUPPORT NETWORKCHUCK
---------------------------------------------------
➡️NetworkChuck membership: https://ntck.co/Premium
☕☕ COFFEE and MERCH: https://ntck.co/coffee
Check out my new channel: https://ntck.co/ncclips
🆘🆘NEED HELP?? Join the Discord Server: https://discord.gg/networkchuck
STUDY WITH ME on Twitch: https://bit.ly/nc_twitch
READY TO LEARN??
---------------------------------------------------
-Learn Python: https://bit.ly/3rzZjzz
-Get your CCNA: https://bit.ly/nc-ccna
FOLLOW ME EVERYWHERE
---------------------------------------------------
Instagram: https://www.instagram.com/networkchuck/
Twitter: https://twitter.com/networkchuck
Facebook: https://www.facebook.com/NetworkChuck/
Join the Discord server: http://bit.ly/nc-discord
0:00 ⏩ Intro
0:39 ⏩ PART 1 - Foundations
4:45 ⏩ PART 2 - Security
5:37 ⏩ PART 3 - Networking
8:30 ⏩ PART 4 - Linux
9:48 ⏩ PART 5 - Coding
12:01 ⏩ PART 6 - Start Hacking
13:40 ⏩ PART 7 - Hacking Certifications
15:33 ⏩ PART 8 - OSCP (then STOP!!)
16:37 ⏩ If I could start over
18:50 ⏩ CAN YOU SKIP IT? (A+ QUIZ)
AFFILIATES & REFERRALS
---------------------------------------------------
(GEAR I USE...STUFF I RECOMMEND)
My network gear: https://geni.us/L6wyIUj
Amazon Affiliate Store: https://www.amazon.com/shop/networkchuck
Buy a Raspberry Pi: https://geni.us/aBeqAL
Do you want to know how I draw on the screen?? Go to https://ntck.co/EpicPen and use code NetworkChuck to get 20% off!!
#cybersecurity #informationtechnology
Full Course: https://academy.tcm-sec.com/p/....practical-ethical-ha
All Course Resources/Links: https://github.com/Gr1mmie/Pra....ctical-Ethical-Hacki
A shout out to all those involved with helping out on this course:
Alek - Creating "Academy", "Dev", and "Black Pearl" Capstone machines and a Discord Admin.
Dewalt - The one man Army of a five star support team.
Dwight - Discord Admin and awesome hacker.
Grimmie - Creation of SumRecon, lover of cookies, and a Discord Admin.
Joe Helle - Creating the "Blue" Capstone machine and the PNPT foothold. The OG support staff and a Discord Admin.
Lian - The OG Discord Admin with French Bulldogs I'd like to steal.
Rumham - Discord Admin, lover of rum and hams, and overall great guy.
0:00 - Introduction/whoami
6:20 - A Day in the Life of an Ethical Hacker
23:14 - Effective Notekeeping
29:58 - Important Tools
35:23 - Networking Refresher: Introduction
36:39 - IP Addresses
49:50 - MAC Addresses
53:07 - TCP, UDP, & the Three-Way Handshake
58:25 - Common Ports & Protocols
1:04:39 - The OSI Model
1:10:14 - Subnetting
1:37:17 - Installing VMWare / VirtualBox
1:43:37 - Installing Kali Linux
1:50:11 - Configuring VirtualBox
1:53:32 - Kali Linux Overview
1:57:05 - Sudo Overview
2:02:22 - Navigating the File System
2:14:26 - Users & Privileges
2:23:54 - Common Network Commands
2:29:50 - Network Commands Update
2:31:49 - Installing & Updating Tools
2:41:01 - Installing gedit
2:42:46 - Viewing, Creating, & Editing Files
2:48:49 - Scripting with Bash
3:11:28 - Intro to Python
3:13:52 - Strings
3:21:25 - Math
3:27:24 - Variables & Methods
3:38:41 - Functions
3:49:40 - Boolean Expressions
3:54:14 - Relational & Boolean Operators
4:01:13 - Conditional Statements
4:10:13 - Lists
4:20:41 - Tuples
4:23:16 - Looping
4:28:18 - Importing Modules
4:34:24 - Advanced Strings
4:47:47 - Dictionaries
4:55:23 - Sockets
5:00:55 - Building a Port Scanner
5:21:09 - The 5 Stages of Ethical Hacking
5:26:31 - Passive Recon Overview
5:34:07 - Identifying Our Target
5:37:46 - Discovering Email Addresses
5:53:38 - Breached Credentials Part 1
6:01:00 - Breached Credentials Part 2
6:13:00 - Hunting Subdomains Part 1
6:18:35 - Hunting Subdomains Part 2
6:23:30 - Identifying Website Technologies
6:30:39 - Gathering Information w/ Burp Suite
6:39:33 - Google Fu
6:45:09 - Utilizing Social Media
6:50:49 - Installing Kioptrix
6:57:12 - Scanning w/ Nmap
7:17:04 - Enumerating HTTP/HTTPS Part 1
7:32:09 - Enumerating HTTP/HTTPS Part 2
7:47:22 - Enumerating SMB
8:01:46 - Enumerating SSH
8:05:59 - Researching Potential Vulnerabilities
8:20:54 - Our Notes So Far
8:24:03 - Scanning w/ Nessus Part 1
8:34:42 - Scanning w/ Nessus Part 2
8:40:57 - Reverse Shells vs Bind Shells
8:48:02 - Staged vs Non-Staged Payloads
8:51:27 - Gaining Root w/ Metasploit
8:59:13 - Manual Exploitation
9:11:57 - Brute Force Attacks
9:19:50 - Credential Stuffing & Password Spraying
9:33:58 - Our Notes, Revisited
9:37:05 - Capstone Introduction
9:42:54 - Setting up Blue
9:46:55 - Blue Walkthrough
10:04:00 - Academy Setup
10:06:28 - Academy Walkthrough
10:50:52 - Dev Walkthrough
11:16:18 - Butler Walkthrough
11:52:41 - Blackpearl Walkthrough
12:16:17 - Conclusion
❓Info❓
___________________________________________
Pentests & Security Consulting: https://tcm-sec.com
Get Trained: https://academy.tcm-sec.com
Get Certified: https://certifications.tcm-sec.com
Merch: https://merch.tcm-sec.com
Sponsorship Inquiries: info@thecybermentor.com
📱Social Media📱
___________________________________________
Twitter: https://twitter.com/thecybermentor
Twitch: https://www.twitch.tv/thecybermentor
Instagram: https://instagram.com/thecybermentor
LinkedIn: https://www.linkedin.com/in/heathadams
Discord: https://discord.gg/tcm
💸Donate💸
___________________________________________
Like the channel? Please consider supporting me on Patreon:
https://www.patreon.com/thecybermentor
Support the stream (one-time): https://streamlabs.com/thecybermentor
My Build:
lg 32gk850g-b 32" Gaming Monitor:https://amzn.to/30C0qzV
darkFlash Phantom Black ATX Mid-Tower Case: https://amzn.to/30d1UW1
EVGA 2080TI: https://amzn.to/30d2lj7
MSI Z390 MotherBoard: https://amzn.to/30eu5TL
Intel 9700K: https://amzn.to/2M7hM2p
G.SKILL 32GB DDR4 RAM: https://amzn.to/2M638Zb
My Recording Equipment:
Panasonic G85 4K Camera: https://amzn.to/2Mk9vsf
Logitech C922x Pro Webcam: https://amzn.to/2LIRxAp
Aston Origin Microphone: https://amzn.to/2LFtNNE
Rode VideoMicro: https://amzn.to/309yLKH
Mackie PROFX8V2 Mixer: https://amzn.to/31HKOMB
Elgato Cam Link 4K: https://amzn.to/2QlicYx
Elgate Stream Deck: https://amzn.to/2OlchA5
*We are a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for us to earn fees by linking to Amazon.com and affiliated sites.
In this weeks episode of Minutes With we sat down with Mustafa Al-Bassam, a former member of Anonymous and one of the founders of LulzSec.
Mustafa tells us how he got in to hacking and how he ended up getting involved in attacks on The Sun, The Westboro Baptist Church and even the US Government.
Subscribe To Our Channel: http://bit.ly/SubscribeLADbible
Facebook: https://www.facebook.com/ladbible/
Instagram: https://www.instagram.com/ladbible/
Twitter: https://twitter.com/ladbible
#LADbible #UNILAD
To license this video please email: licensing@ladbiblegroup.com