admire my signature

Discussion in 'The Edge of the Forum' started by Petraplexity, Dec 23, 2015.

?

is it gud

  1. yes

    10.0%
  2. mmm whatcha smea

    90.0%
  1. Petraplexity
    OP

    Petraplexity Fidget-Spinning Spicy Memelord™

    Member
    387
    813
    Sep 5, 2015
    United States
    Over There
    Reasons to get a N3DS:
    1. Homebrew
    2. uhh...

    Crap and Stuff
     
  2. Games&Stuff

    Games&Stuff GBAtemp Advanced Fan

    Member
    787
    564
    Oct 8, 2015
    Belgium
    What have to do with this?
     
  3. TheZander

    TheZander member

    Member
    1,086
    772
    Feb 1, 2008
    United States
    whats with all the weirdos obsessed with smealum? and you quoted my wiiu hack post
     
  4. BurningDesire

    BurningDesire GBAtemp Psycho!

    Member
    4,962
    5,811
    Jan 27, 2015
    United States
    Behind a screen reading news
    Without smea we all most likely would never have met on these forums.
     
    GalladeGuy and Bubsy Bobcat like this.
  5. SomeGamer

    SomeGamer GBAtemp Guru

    Member
    5,755
    2,712
    Dec 19, 2014
    Hungary
    You have a point there, but I think one smea is still enough.
     
    BurningDesire likes this.
  6. TheZander

    TheZander member

    Member
    1,086
    772
    Feb 1, 2008
    United States
    but the weird avatars and goofy post
     
  7. BurningDesire

    BurningDesire GBAtemp Psycho!

    Member
    4,962
    5,811
    Jan 27, 2015
    United States
    Behind a screen reading news
    There was a phase that we where smea clones. I combined Smea and Garret ward
     
  8. TheZander

    TheZander member

    Member
    1,086
    772
    Feb 1, 2008
    United States
    its kind of weird isnt it.
     
  9. BurningDesire

    BurningDesire GBAtemp Psycho!

    Member
    4,962
    5,811
    Jan 27, 2015
    United States
    Behind a screen reading news
    Why do you think I changed :D
     
  10. SomeGamer

    SomeGamer GBAtemp Guru

    Member
    5,755
    2,712
    Dec 19, 2014
    Hungary
    Yeah, you're totally right and I think @Petraplexity should follow suit. Wait, no. That means an "admire my avatar" thread.
    EDIT: With weird mmm watcha-or-yes polls. It's not worth it.
     
    Last edited by SomeGamer, Dec 23, 2015
    BurningDesire likes this.
  11. TheZander

    TheZander member

    Member
    1,086
    772
    Feb 1, 2008
    United States
    is it like the toon link phase as well?
     
  12. BurningDesire

    BurningDesire GBAtemp Psycho!

    Member
    4,962
    5,811
    Jan 27, 2015
    United States
    Behind a screen reading news
    Yes but it lasted less then a week
     
  13. TheZander

    TheZander member

    Member
    1,086
    772
    Feb 1, 2008
    United States
    i wonder why i was quoted in this post i dont think ive ever had dealings with this guy
     
  14. Petraplexity
    OP

    Petraplexity Fidget-Spinning Spicy Memelord™

    Member
    387
    813
    Sep 5, 2015
    United States
    Over There
    Because that post was really stupid
    and completely wrong
     
  15. TheZander

    TheZander member

    Member
    1,086
    772
    Feb 1, 2008
    United States
    It wasn't that stupid. The WiiU utilizes Gigabytes not Megabytes if you ever read cNET you'd know.

    Completely wrong? Do you the first thing about exploiting?
     
  16. VinsCool

    VinsCool Comfortably Numb

    Member
    GBAtemp Patron
    VinsCool is a Patron of GBAtemp and is helping us stay independent!

    Our Patreon
    11,854
    28,348
    Jan 7, 2014
    Canada
    Another World
    Admire MY signature
     
  17. Petraplexity
    OP

    Petraplexity Fidget-Spinning Spicy Memelord™

    Member
    387
    813
    Sep 5, 2015
    United States
    Over There
    *sigh* I'd hoped I wouldn't have to do this...


    Exploits are not found or inherently based in any order of magnitude of bytes (be it bits, bytes, kilobytes, megabytes, gigabytes, etc.) Exploits are not found by reading binary code, they are found by (to put it in the simplest terms) reading C, C#, C++, Javascript, and other types of code.

    You can not exploit a button.

    "psedo code" (should be spelled "pseudocode") is just human-readable code. It has nothing to do with exploitation. You don't need an understanding of it. "hack_exploit_trigger_left=true" is just something you made up. And you just run unsigned code. You don't "run unsigned code in binary".

    Signing code does not mean writing your name on it.
     
  18. TheZander

    TheZander member

    Member
    1,086
    772
    Feb 1, 2008
    United States
    hmm this is very interesting, i have read several ebooks on security and penetration testing andd all my studies have lead me to thinking that reconfiguring the binary output of a megabyte can inherently dismantle security protocols leaving the exploit available to insert and run your own code i.e. hack the trigfer button everytime it runs flawlessly.

    but youve given me a lot to consider and ponder over
     
  19. GalladeGuy

    GalladeGuy Freeze Kirby :3

    Member
    2,582
    2,641
    Oct 28, 2015
    United States
    What you should be admiring is my signature! Especially the bottom half!