Would it be theoretically possible to design a 100% legal ransomware where the user voluntarily chooses to encrypt their files and pay to decrypt them [closed]

Would it be theoretically possible to design a 100% legal ransomware where the user voluntarily chooses to encrypt their files and pay to decrypt them? (Seriously, I always wondered if it was possible!) For example, the software would have… Continue reading Would it be theoretically possible to design a 100% legal ransomware where the user voluntarily chooses to encrypt their files and pay to decrypt them [closed]

How do I convert any arbitrary .EXE to .DLL, in order to bypass program restrictions?

On a computer that blocks third-party programs, I figured that you could use use PowerShell and C#’s DllImport() function to import a native C program as a DLL and run it, and the program would simply appear as part of powershell.exe in th… Continue reading How do I convert any arbitrary .EXE to .DLL, in order to bypass program restrictions?

Is there software on Windows that will protect myself from devices like the "USB Rubber Ducky"? [duplicate]

I’m pretty sure a lot of you are familiar with the "USB Rubber Ducky", the USB stick that emulates a keyboard. Is there software for Windows that will prevent this type of attack, while still letting me use legitimate keyboards? … Continue reading Is there software on Windows that will protect myself from devices like the "USB Rubber Ducky"? [duplicate]