Hell that was so easy, these people are as thick as mince. The interviewer didn't even have to be the slightest bit canny, she just asked them and they blurted it out.
I don't have a dog. I don't have a cat, and I do have two dates of birth, one that's none of your business and one that I use when someone for some reason thinks he needs it. And that one also is none of your business.
Do not laugh about these muppets. The same thing happened to the former Director of the CIA, John Brennan. However, if you look at Brennan's face closely enough you will see sufficient proof that he must be a direct descendant of Neanderthal cavemen. Perhaps this explains his clumsy handling of IT affairs.
Another pro tip: drop a USB thumb drive, or nowadays an SD card, with malware where folks take a smoke break. Back in the day, easiest way to get access to a network. Curiosity killed the cat.
Yep, it is still a very viable attack method. People used to drop USB drives all over military bases, SD chips, etc. Dumb boot picks it up and infects himself, the squad leader or platoon sergeant eventually needs a thumb drive and bums one. The squad leader may also be promoted up the food chain and that thumb drive follows along.
The worst is when Chinese manufactures put malware infected firmware CHIPS on the drive and you can't clean that off without physically changing the firmware chip or figuring out how to flash it. It was a problem with some hard drives a few years ago and I'm certain it is still employed, just like I'm certain the NSA still intercepts and bugs consumer electronics en mass.
Barracks dumpsters are a goldmine for RAM, hard drives, components, etc. The computer illiterate smash up the laptops and screens thinking it's destroyed but then I come along, toss the busted up case and screen, then get a working computer from the internals and all the movies, music, pictures, etc, from the hard drive. I tried to educate people on data security but most of it fell on deaf ears. Someone was still using WPA on their wifi which is effectively free wifi for anyone who is familiar with the aircrack tools, let that sink in for a bit.
TMK, any respectable IT department disables all USB ports on computers now and uses legacy for input devices when possible. I'm not IT, just some redneck in the sticks, but I hear it is a constant battle against stupidity.
I make use of the unicode table for passwords and that knocks out most 104 key brute force attacks, table attacks, and dictionary attacks. Decice security, physical surveillance, etc, are still factors. Nothing is ever secure, only degrees of confidence.
There are many password manager products out there. Take your pick. I use this one, https://keepass.info/ KeePass and many others are free.
I know the strong password to open the password manager, but I don't know the even stronger password to the bank, or other important accounts.
Keepass has options for the truly paranoid, such as a 1024 character second password on a flash drive. Unfortunately, it takes significant dedication to use it. Don't start unless you really intend to learn it and stick with it.
Hell that was so easy, these people are as thick as mince. The interviewer didn't even have to be the slightest bit canny, she just asked them and they blurted it out.
ReplyDeleteStony ... YCFS ... You Can't Fix Stupid
DeleteAnd these people vote.....
ReplyDeleteI don't have a dog. I don't have a cat, and I do have two dates of birth, one that's none of your business and one that I use when someone for some reason thinks he needs it. And that one also is none of your business.
ReplyDeleteUse a password manager.
DeleteThis will allow you to random names and dates for everything.
Remember, They vote and along with their dead great grandparents they vote Democrat.
ReplyDeleteDo not laugh about these muppets.
ReplyDeleteThe same thing happened to the former Director of the CIA, John Brennan.
However, if you look at Brennan's face closely enough you will see sufficient proof that he must be a direct descendant of Neanderthal cavemen.
Perhaps this explains his clumsy handling of IT affairs.
All female till the end ha ha ha ha
ReplyDeleteThese two ladies are about as bright as John Podesta. Poor things.
ReplyDelete...and the women just give it away without a second thought. Nemo
ReplyDeleteThey vote, and the most likely will procreate.
ReplyDeleteWe're doomed.
Biden voters...
ReplyDeleteOh my GOD! That girl's from my high school.
ReplyDeleteMight wanna double-check and see if your diploma is any good...
DeleteThe Chinese assess our readiness and defensive aptitude by vids like this.
ReplyDeleteAnother pro tip: drop a USB thumb drive, or nowadays an SD card, with malware where folks take a smoke break. Back in the day, easiest way to get access to a network. Curiosity killed the cat.
ReplyDeleteYep, it is still a very viable attack method. People used to drop USB drives all over military bases, SD chips, etc. Dumb boot picks it up and infects himself, the squad leader or platoon sergeant eventually needs a thumb drive and bums one. The squad leader may also be promoted up the food chain and that thumb drive follows along.
DeleteThe worst is when Chinese manufactures put malware infected firmware CHIPS on the drive and you can't clean that off without physically changing the firmware chip or figuring out how to flash it. It was a problem with some hard drives a few years ago and I'm certain it is still employed, just like I'm certain the NSA still intercepts and bugs consumer electronics en mass.
Barracks dumpsters are a goldmine for RAM, hard drives, components, etc. The computer illiterate smash up the laptops and screens thinking it's destroyed but then I come along, toss the busted up case and screen, then get a working computer from the internals and all the movies, music, pictures, etc, from the hard drive. I tried to educate people on data security but most of it fell on deaf ears. Someone was still using WPA on their wifi which is effectively free wifi for anyone who is familiar with the aircrack tools, let that sink in for a bit.
TMK, any respectable IT department disables all USB ports on computers now and uses legacy for input devices when possible. I'm not IT, just some redneck in the sticks, but I hear it is a constant battle against stupidity.
-arc
In fact, they dropped a bunch of ubs around Langley and found
Delete1) 81% plugged them in
2) the more "top secret" it looked, the more likely a Langley grad plugged it in instead of turning it in.
These are the capabilities of our premier spies = a bunch of fking idiots who fall for the simplest of entrapment gags.
Libs started taking over universities, govt positions and promoting their own since Vietnam... now they own them.
The women were totally stupid idiots. The one guy they put at the end was too smart for that shit.
ReplyDeleteWomen simply do not know when to keep their mouth shut. Ever notice that?
Especially if a camera is involved
DeleteI make use of the unicode table for passwords and that knocks out most 104 key brute force attacks, table attacks, and dictionary attacks. Decice security, physical surveillance, etc, are still factors. Nothing is ever secure, only degrees of confidence.
ReplyDeleteüทÎcÖÐÉ!
-ÀR©
I just wanna know why nobody is making me a damn sammich!?!?!
ReplyDeleteThose gals couldn't follow the recipe for a peanut butter sandwich.
DeleteHere's a way to not be like these victims.
ReplyDeleteThere are many password manager products out there. Take your pick. I use this one, https://keepass.info/ KeePass and many others are free.
I know the strong password to open the password manager, but I don't know the even stronger password to the bank, or other important accounts.
Keepass has options for the truly paranoid, such as a 1024 character second password on a flash drive. Unfortunately, it takes significant dedication to use it. Don't start unless you really intend to learn it and stick with it.
Geek
And they Vote too
ReplyDelete