4.8 • 2.7K Ratings
🗓️ 12 April 2025
⏱️ 23 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | I hacked my sister's PC and read her Facebook messages to learn the truth about her. |
0:06.2 | This all took place many years ago when I was a freshman in high school. I'd bought an iPod |
0:11.8 | nano, which was hot stuff back then, with money that I'd earned by helping my neighbor, and as I didn't |
0:17.2 | make much, I was pretty protective of my iPod. My scumbag sister had also |
0:21.8 | recognized that it was worth a few hundred. As I later found out, she had stolen it and given it to a |
0:27.6 | friend temporarily until the heat was off. I suspected this immediately when it wasn't on my desk, |
0:33.8 | where I knew where I left it. I asked my parents if I had done something that warranted |
0:38.4 | punishment, but neither had touched it. Clearly, I needed evidence to pin my sister. As a |
0:44.4 | freshman, I was pretty computer savvy. At the time, I was learning a few programming languages |
0:49.0 | and had kind of a good feel for novice hacking. Nothing serious, but enough to get in trouble at school kind of thing. |
0:55.5 | I got to work on a spy tool. My plan was to get into her email and Facebook where I hoped |
1:00.7 | to find evidence. At the very least, I could mess up her account and get revenge. A few hours of work |
1:06.5 | later and the program was done. And it was way more than a simple spy tool. |
1:11.6 | Although I honestly had no idea how to make a spy tool at the time, |
1:14.6 | I damn sure knew how to write a batch file that would mess up your Windows partition six ways to Sunday. |
1:20.6 | I'd basically written a carpet bomb that had the same icon as Internet Explorer. |
1:25.6 | The virus, can I call it that? Was armed when you replaced |
1:29.1 | the default Internet Explorer EXE file with the malicious file that shared the same file name and icon. |
1:35.9 | Of course, when you went to run Internet Explorer, you set it off. The original file would be launched |
1:40.9 | after the virus ran, so everything was still usable. Of course, my original |
1:45.2 | goal was still carried out. I'd packaged in a simple key logger, which records keystrokes, |
1:50.5 | that any decent antivirus would have noticed instantly. But once my sister was out of the house, |
... |
Transcript will be available on the free plan in 6 days. Upgrade to see the full transcript now.
Disclaimer: The podcast and artwork embedded on this page are from youtube.com/amithejerk, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of youtube.com/amithejerk and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.