SlideShare una empresa de Scribd logo
1 de 10
Stealing On
The Internet
Is it bad???
My Task
Create a PP Presentation
on the following topics:
•Stealing from internet
•Stealing from a shop
•Is it ever okay to steal?
Robbery
• Robbery is the crime of taking or attempting
to take anything of value by force, threat of
force, or by putting the victim in fear.
According to common law, robbery is
defined as taking the property of another,
with the intent to permanently deprive the
person of that property, by means of force
or fear; that is, it is
a larceny or theft accomplished by
an assault.
Hacking
• A computer hacker is any skilled computer
expert that uses their technical knowledge
to overcome a problem. While "hacker" can
refer to any skilled computer programmer,
the term has become associated in popular
culture with a "security hacker", someone
who, with their technical knowledge,
uses bugs or exploits to break into computer
systems.
Streaming video is
content sent in
compressed form over
the Internet and
displayed by the viewer
in real time.
With streaming video
or streaming media, a
Web user does not have
to wait to download a
file to play it. Instead,
the media is sent in a
continuous stream of
data and is played as it
arrives.
Robbing the
internet
Many sites like GoMovies, FMovies,
MovieBox, 123Movies, 9Anime are illegal
sites.
Always be careful when downloading and
streaming sites.
GoMovies FMovies
9Anime
How To Be A Hacker
Step 0: Read The Hacking Manifesto
It is not an easy task to be a hacker. As a hacker, you need to have an attitude and curiosity. Reading the hacking manifesto can teach you the attitude of a hacker. Nurturing the hacker attitude is more about developing competence in the languages rather than having a stereotypical
attitude.
Though a lot of people consider that a hacker is a criminal; However in real life, they are hired by big companies for protecting information and minimizing potential damage. The act of hacking actually is that of being over-curious and outwitting authority. As a hacker, you should be
hell bent on breaching authoritarian rules, secrecy and censorship. Deception is another arsenal which will allow you to dodge the vigilant eyes of authority.
The act of stealing something or doing harm to someone is not hacking. Such people are commonly called crackers in the community. Crackers are involved in illegal activities and I will not recommend you to get involved into such activities.
Step 1: Learn To Program In C
C programming being one of the most powerful languages in computer programming, It is necessary to really master this language. This programming language was invented by Denise Ritchie in between the
years 1969 and 1973 at AT& T Bell Labs. C programming will essentially help you divide the task in smaller pieces and these pieces can be expressed by a sequence of commands. Try writing some program on
your own by assessing the logic.
There are hundreds of Free C Programming PDF & tutorials available on web to learn, however I would recommend you to start with a simple and well written c programming book of your choice and then read this book (C Programming Language
By Brian W. Kernighan and Dennis M. Ritchie) to understand the real power of c language.
This books is not an easy read however its a must read book to get in depth understanding for C Programming.
Step 2: Learn More Than One Programming Language
When you are trying to become a hacker, it is very important to learn other modern computer programming languages such as JAVA, HTML, Perl, PHP and Python. One of the best ways to learn these is by reading books from experts.
Java is one of the most popular programming languages. It has been claimed that its also very secure. Knowing Java security model will empower you to understand how this language achieve security. Learn about the security
loop holes in Java language and related frameworks. Pick and read from many free PDF, tutorials and ebooks available to learn java online.
Perl is a general purpose dynamic programming language, which is high level and can be interpreted. This language borrows some features of C language. On the other hand, JAVA is concurrent, class based and objects oriented programming language. Python is really handy when you
are trying to automate some repetitive tasks.
HTML is the mark up language based on which the web pages are designed, created and displayed. The web browsers read the HTML code to display the web page.
Python is best language for web development and favorite language of a lot of programmer due to its simplicity and quick turn around. A lot of people use Python to do simple and complex automation.
Step 3: Learn UNIX
UNIX is a multi-tasking and multi-user computer operating system that is designed to provide good security to the systems.This operating system was developed by some employees of AT&T in Bell Labs.The best way to learn it is to get into an open-source version (e.g. centos)
and install/run the same on your own. You can operate internet without learning UNIX, but it is not possible for you to be an internet hacker without understanding UNIX.
If you have not used Unix operating system yet, a few essential linux commands will make your comfortable in getting quickly started.
Unix in a Nutshell by Arnold Robbins is a good way to start. This book will teach you how to use Unix.
The next thing you need to know is the internals of this operating system. I recommend
The Design of the UNIX Operating System by Maurice J. Bach for getting in depth understanding of Unix operating system.
A large number of web servers are hosted on Unix based servers and knowing internals of this operating system is going to be really a big boost in your skills.
Step 4: Learn More Than One Operating Systems
There are many other operating systems apart from UNIX. Windows operating system is one of the most commonly compromised systems, hence it is good to learn hacking Microsoft systems, which are closed-source systems.
For more info: https://www.quora.com/How-does-one-become-a-hacker-2
Hacker's Perspective
• “Data breaches take an average of 250-300 days to detect—if
they’re detected at all—but most attackers tell us they can
break in and steal the target data within 24 hours,” said Chris
Pogue, Nuix’s chief information security officer and a co-author
of the Nuix Black Report. “Organizations need to get much
better at detecting and remediating breaches using a
combination of people and technology.”
Best Way To Rob A Shop
• Here is the best way I could think:
• Get a new set of clothes that are the opposite of your taste.
• Get gloves and a mask of some sort.
• Have a gun. Preferably an all-black pistol. Make sure you have a permit for said gun, and you bought it legally.
• Have a bike and car, put the bike behind said building, and park the car out of sight from the building.
• Go there in your full gear, new clothes that you don't like, mask, the gun, and a non-descript backpack.
• Make sure it's a less busy time of day, say minutes till closing.
• Walk in, point your gun at the cashier, and in a nice tone say, “please put all of the money in that register in my backpack here”. People cooperate with a nice person, gun or no
gun (but you still need a gun for this specific task). Oh, and don't forget to demand all their electronics be put on the counter. Shoot their phone.
• If they do not comply, fire a warning shot. Remember, NEVER shoot the person. Then you will be even more a wanted man (or woman, I isn't no judge.)
• Once you have a nice fill of cash, order them to go in the bathroom, or a broom closet. Once they are in, shove a large cart or shelf in front of the door. This gives you an easy
escape.
• Go ahead and take that snack size Dorito bag. You earned it.
• Walk out, hop on your bike, and ride to your car. Put the bike in the car and drive off. Always remember to drive your BEST while getting away. A simple speeding ticket could be
it for you. Dump the clothes in a dumpster or lake after this.
• Then just drive on home, hide your cash in a safe place and don't in any circumstances put the money in a bank within after 3 weeks of your crime. After your three weeks,
deposit your money in pieces, you don't want to deposit $312 right after a local gas station was robbed of that exact amount.
• Happy robbing!
https://www.youtube.com/watch?v=JmCyJtlM
T18
Look at
this video
for more
information

Más contenido relacionado

Más de Julie Cullen (20)

Conor
ConorConor
Conor
 
Chuks
ChuksChuks
Chuks
 
Carlene
CarleneCarlene
Carlene
 
Alex&Krista
Alex&KristaAlex&Krista
Alex&Krista
 
Adam
AdamAdam
Adam
 
Tia
TiaTia
Tia
 
Sophie
SophieSophie
Sophie
 
Ronan
RonanRonan
Ronan
 
Rhianna
RhiannaRhianna
Rhianna
 
Ramona
RamonaRamona
Ramona
 
Michael
MichaelMichael
Michael
 
Mahrukh
MahrukhMahrukh
Mahrukh
 
Lily
LilyLily
Lily
 
Lee
LeeLee
Lee
 
Leah
LeahLeah
Leah
 
Intrests
IntrestsIntrests
Intrests
 
Leah
LeahLeah
Leah
 
Ronan
RonanRonan
Ronan
 
Trust
TrustTrust
Trust
 
Tia
TiaTia
Tia
 

Último

SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxcallscotland1987
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 

Último (20)

SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 

Trust

  • 2. My Task Create a PP Presentation on the following topics: •Stealing from internet •Stealing from a shop •Is it ever okay to steal?
  • 3. Robbery • Robbery is the crime of taking or attempting to take anything of value by force, threat of force, or by putting the victim in fear. According to common law, robbery is defined as taking the property of another, with the intent to permanently deprive the person of that property, by means of force or fear; that is, it is a larceny or theft accomplished by an assault.
  • 4. Hacking • A computer hacker is any skilled computer expert that uses their technical knowledge to overcome a problem. While "hacker" can refer to any skilled computer programmer, the term has become associated in popular culture with a "security hacker", someone who, with their technical knowledge, uses bugs or exploits to break into computer systems.
  • 5. Streaming video is content sent in compressed form over the Internet and displayed by the viewer in real time. With streaming video or streaming media, a Web user does not have to wait to download a file to play it. Instead, the media is sent in a continuous stream of data and is played as it arrives.
  • 6. Robbing the internet Many sites like GoMovies, FMovies, MovieBox, 123Movies, 9Anime are illegal sites. Always be careful when downloading and streaming sites. GoMovies FMovies 9Anime
  • 7. How To Be A Hacker Step 0: Read The Hacking Manifesto It is not an easy task to be a hacker. As a hacker, you need to have an attitude and curiosity. Reading the hacking manifesto can teach you the attitude of a hacker. Nurturing the hacker attitude is more about developing competence in the languages rather than having a stereotypical attitude. Though a lot of people consider that a hacker is a criminal; However in real life, they are hired by big companies for protecting information and minimizing potential damage. The act of hacking actually is that of being over-curious and outwitting authority. As a hacker, you should be hell bent on breaching authoritarian rules, secrecy and censorship. Deception is another arsenal which will allow you to dodge the vigilant eyes of authority. The act of stealing something or doing harm to someone is not hacking. Such people are commonly called crackers in the community. Crackers are involved in illegal activities and I will not recommend you to get involved into such activities. Step 1: Learn To Program In C C programming being one of the most powerful languages in computer programming, It is necessary to really master this language. This programming language was invented by Denise Ritchie in between the years 1969 and 1973 at AT& T Bell Labs. C programming will essentially help you divide the task in smaller pieces and these pieces can be expressed by a sequence of commands. Try writing some program on your own by assessing the logic. There are hundreds of Free C Programming PDF & tutorials available on web to learn, however I would recommend you to start with a simple and well written c programming book of your choice and then read this book (C Programming Language By Brian W. Kernighan and Dennis M. Ritchie) to understand the real power of c language. This books is not an easy read however its a must read book to get in depth understanding for C Programming. Step 2: Learn More Than One Programming Language When you are trying to become a hacker, it is very important to learn other modern computer programming languages such as JAVA, HTML, Perl, PHP and Python. One of the best ways to learn these is by reading books from experts. Java is one of the most popular programming languages. It has been claimed that its also very secure. Knowing Java security model will empower you to understand how this language achieve security. Learn about the security loop holes in Java language and related frameworks. Pick and read from many free PDF, tutorials and ebooks available to learn java online. Perl is a general purpose dynamic programming language, which is high level and can be interpreted. This language borrows some features of C language. On the other hand, JAVA is concurrent, class based and objects oriented programming language. Python is really handy when you are trying to automate some repetitive tasks. HTML is the mark up language based on which the web pages are designed, created and displayed. The web browsers read the HTML code to display the web page. Python is best language for web development and favorite language of a lot of programmer due to its simplicity and quick turn around. A lot of people use Python to do simple and complex automation. Step 3: Learn UNIX UNIX is a multi-tasking and multi-user computer operating system that is designed to provide good security to the systems.This operating system was developed by some employees of AT&T in Bell Labs.The best way to learn it is to get into an open-source version (e.g. centos) and install/run the same on your own. You can operate internet without learning UNIX, but it is not possible for you to be an internet hacker without understanding UNIX. If you have not used Unix operating system yet, a few essential linux commands will make your comfortable in getting quickly started. Unix in a Nutshell by Arnold Robbins is a good way to start. This book will teach you how to use Unix. The next thing you need to know is the internals of this operating system. I recommend The Design of the UNIX Operating System by Maurice J. Bach for getting in depth understanding of Unix operating system. A large number of web servers are hosted on Unix based servers and knowing internals of this operating system is going to be really a big boost in your skills. Step 4: Learn More Than One Operating Systems There are many other operating systems apart from UNIX. Windows operating system is one of the most commonly compromised systems, hence it is good to learn hacking Microsoft systems, which are closed-source systems. For more info: https://www.quora.com/How-does-one-become-a-hacker-2
  • 8. Hacker's Perspective • “Data breaches take an average of 250-300 days to detect—if they’re detected at all—but most attackers tell us they can break in and steal the target data within 24 hours,” said Chris Pogue, Nuix’s chief information security officer and a co-author of the Nuix Black Report. “Organizations need to get much better at detecting and remediating breaches using a combination of people and technology.”
  • 9. Best Way To Rob A Shop • Here is the best way I could think: • Get a new set of clothes that are the opposite of your taste. • Get gloves and a mask of some sort. • Have a gun. Preferably an all-black pistol. Make sure you have a permit for said gun, and you bought it legally. • Have a bike and car, put the bike behind said building, and park the car out of sight from the building. • Go there in your full gear, new clothes that you don't like, mask, the gun, and a non-descript backpack. • Make sure it's a less busy time of day, say minutes till closing. • Walk in, point your gun at the cashier, and in a nice tone say, “please put all of the money in that register in my backpack here”. People cooperate with a nice person, gun or no gun (but you still need a gun for this specific task). Oh, and don't forget to demand all their electronics be put on the counter. Shoot their phone. • If they do not comply, fire a warning shot. Remember, NEVER shoot the person. Then you will be even more a wanted man (or woman, I isn't no judge.) • Once you have a nice fill of cash, order them to go in the bathroom, or a broom closet. Once they are in, shove a large cart or shelf in front of the door. This gives you an easy escape. • Go ahead and take that snack size Dorito bag. You earned it. • Walk out, hop on your bike, and ride to your car. Put the bike in the car and drive off. Always remember to drive your BEST while getting away. A simple speeding ticket could be it for you. Dump the clothes in a dumpster or lake after this. • Then just drive on home, hide your cash in a safe place and don't in any circumstances put the money in a bank within after 3 weeks of your crime. After your three weeks, deposit your money in pieces, you don't want to deposit $312 right after a local gas station was robbed of that exact amount. • Happy robbing!