Subjects of Equestria! We are pleased to kick off the Nightmare Night Festivities and the 14th anniversary of the return of our beloved Princess Luna! Join us in celebration!
Interested in advertising on Derpibooru? Click here for information!
Steam Drulls - Furry 3D Platfromer!

Help fund the $15 daily operational cost of Derpibooru - support us financially!

Description

he changed your wifi password 😭 😭
commission for Crazy_Genetic

safe2254007 artist:midnightflight125 oc990268 oc only724100 oc:crazy_genetic5 cyborg5653 pony1685378 unicorn574783 semi-anthro23526 arm hooves17453 computer8563 cyberpunk2859 cyberpunk 2077262 digital art31937 error1667 glitch1344 horn234000 laptop computer3425 looking at you279422 solo1494873 text95534 unicorn oc34848

Comments

Syntax quick reference: **bold** *italic* ||hide text|| `code` __underline__ ~~strike~~ ^sup^ %sub%

Detailed syntax guide

Background Pony #AD06
@Background Pony #40DA
I was thinking the same thing, but I didn’t want to be too harsh with my criticism :p
The art’s very nice, no doubt about that… It’s just that as an IT professional I always tend to spot things like this and go “hmm.”
Background Pony #40DA
@Rennac
Whilst there s more “realism” in this picture then a myriad of other media with respect to a man in the middle attack, your comment is somewhat comparable to saying “a guy walks into a building” is something that happens during a bank robbery.
From the description, “changing your wifi password” is also typically not something you do with a man in the middle attack. Not sure how that would fit well in my analogy though; maybe ‘requested a new pin number’?
Background Pony #AD06
@Rennac
As someone who works in cybersecurity, you should probably have realized the terms were just describing a regular TCP connection and TLS handshake… Like the one that’s about to happen when I press “Post” on this comment.
Rennac
Lunar Supporter - Helped forge New Lunar Republic's freedom in the face of the Solar Empire's oppressive tyrannical regime (April Fools 2023).
Non-Fungible Trixie -

Honestly, as someone who works in cybersecurity, kudos. The terms are all pretty much applicable to what a man in the middle hacking attack would look like, or at least reasonably close given the different setting.