ET only reads headlines so you posting the article is worthless. Believe me, I've tried. Now admit to your repost. Also, I don't fall for fake news, that's for boomers like you. How's CRT working out? Election fraud and voter IDs? Immigrant scaravans?
I think GWB missed boomerdome by a few months most likely. Just a technicality though. I have plenty of bandwidth to assist in some attacks, being the chap I am what appears to be my router is not, misreporting the model and nobody ever seen my real phone model etc. I'm quite well set up.
I expect you saved the graphic of the headline from some social media site -- and then uploaded it to ET. We are seeing a continuous trend of doctored headlines graphics on social media with examples also being found on ET. Without a url backing your headline -- we can only assume that your headline graphic is doctored nonsense. But -- if you don't believe in providing a url as proof then we can all spend hours enjoying doctored graphics... or even creating our own.
It would but I have more bandwidth direct with fiber 1Gb upload. Fuck 'em. I'd rather go to Romania and train people to shootas that's something I'm very good at but the missus would be stressed. Hell of a mid-life crisis adventure though My predisposition to hate Russian arseholes (not all of them though) is very strong. Good to see this and all. Not just supporting the Dutch shipment, direct supplies from Germany. They better start building LNG gas ships.
And then there are the Russian hackers threatening to take down critical infrastructure in the West... Russia-based ransomware group Conti issues warning to Kremlin foes https://www.reuters.com/technology/...conti-issues-warning-kremlin-foes-2022-02-25/ A Russia-based cybercrime group, known for using ransomware to extort millions of dollars from U.S. and European companies, vowed on Friday to attack enemies of the Kremlin if they respond to Russia's invasion of Ukraine. In a blog post, the Conti group said it was announcing its "full support" for the government of President Vladimir Putin. On Thursday, the Russian military invaded neighboring Ukraine from the north, east and south, in the biggest attack on a European state since World War Two .read more "If anybody will decide to organize a cyberattack or any war activities against Russia, we are going to use our all possible resources to strike back at the critical infrastructures of an enemy," the Conti blog post read. Ukraine has been hammered by digital intrusions and denial-of-service attacks both in the run-up to and during the Russian invasion. Reuters reported on Thursday that the Ukrainian government has called for volunteers from country's hacker underground to help protect critical infrastructure and cyber-spy on Russian troops. read more "A portion of actors involved with Conti ransomware are based in Russia and some criminals operating from there already have documented ties with Russian intelligence apparatus," said Kimberly Goody, a director with U.S. cybersecurity company Mandiant. She said the Kremlin had benefited in the past from its relationships with cyber criminals, "and even if not outright directed to take action, these actors could conduct 'patriotic' operations independently." Brett Callow, a threat analyst at New Zealand-based cybersecurity company Emsisoft, noted that Conti has made "big and outrageous" claims before. But he recommended U.S. companies keep a close eye on their cyber defenses as cyberattacks in Ukraine could spill out abroad. First detected in 2019, Conti has since been blamed for ransomware attacks against numerous U.S. and European companies. In those incidents, Conti hackers invaded networks and encrypted data, disrupting operations and demanding payment to restore access. Among the victims were a federal court in Louisiana and a New Mexico hospital, according to research by Emsisoft. In May, the FBI said Conti was responsible for attacks on 16 U.S. medical and first response networks, Reuters previously reported.