Tumgik
#if i dont get into information security then maybe cloud computing
greysstrategy · 2 years
Text
Bv4 torchat may not be safe
Tumblr media
#Bv4 torchat may not be safe manual
#Bv4 torchat may not be safe full
#Bv4 torchat may not be safe software
#Bv4 torchat may not be safe download
#Bv4 torchat may not be safe software
It's software that is almost entirely autonomous that creates botnets that can be manipulated/instructed in whole or in part via a single manageability platform, which has, historically, been IRC. Most of the garbage that ends up on home user computers isn't targeted period. The primary purpose for much of the stuff that goes after home users is to get usernames and passwords as well as personal information like credit card numbers that go into a big database that can be sold or for the purposes of identity theft. It isn't "a hacker" targeting a user like they might target a specific business that is an "of significant value" target. This software, and malware like it, is developed to be hands-off. Again, be smart no matter what kind of router you have, also keep the firmware updated, or just throw it out and get a new one. disclosure, I am in no way an expert on any of this, but If the average homeowner would just be careful they would be safe, routers hacks are not coming after you. When hackers go after homeowners, they are a dime a dozen, the people who willingly click on links and give out personal information, they do not even need to be hacked until they willingly give up the information!. Other QNAP NAS devices running QTS softwareĪgain, not at all discounting any security threat, always smart to be prudent but the fact is a hacker is not looking to invade your home computer in this way.īusiness systems sure, maybe, but as a homeowner your not at all worth the money and time spent for a possible little return. MIKROTIK ROUTEROS VERSIONS FOR CLOUD CORE ROUTERS: "Given our observations with this threat, we assess with high confidence that this list is incomplete and other devices could be affected."
#Bv4 torchat may not be safe full
Here is the full list as posted in the link from Overkill The TP link model affected is - TP-Link SafeStream TL-R600VPNĬompare the above to the Netgear and Linksys routers affect and I can say 100% for sure someone here is using them. Only one known TP Link router was affected and I can say for 100% sure no one in this forum has ever had one, never will or even knows it exists. I noticed the TP Link comments in here and I am sure goes for other routers and I am sure again, other routers not even mentioned are affected. Sometimes we need (for our own good) to read the factual information. It doesnt matter, your TP-Link was NOT an affected router. When it comes to security it seems nothing is secure. Just replaced an old Netgear router with a TP-Link. This was using Photobucket downloads to load it into your router.Īnyway, I do agree with you, but I wont blame router companies etc, anything to do with the Internet and protection from attacks is like a huge umbrella as far as security, trying to stop every single raindrop from getting through but there is always one and there is ALWAYS someone who folds up the umbrella, makes a dash for it out of the rain hoping not to get wet.
#Bv4 torchat may not be safe download
Just like almost any hack, someone has to download it into your system. I found your link VERY interesting and in it, it makes very clear, the hack was from Photobucket, if I understand it correctly, the hacks used Photobucket to load the malware into, Once again, it is the USER who downloaded the malware into their system. No such thing as 100% secure, every single institution is hacked sooner or later, including the highest levels of government with the most robust protection systems in the world. I dont disagree with you, but EVERYTHING is hackable. This creates an environment that's conducive to developing this kind of malware, as you are dealing with known vulnerabilities managed by a user base that is predominantly clueless.
#Bv4 torchat may not be safe manual
On top of that, even devices that are, most of them require manual updating, a process which most consumers are in no way familiar with. There are hundreds of known vulnerabilities in consumer router firmware from various manufacturers that will likely never be patched because that product is no longer "current". I think really, that this brings into focus the bigger issue at play here, which is the rot-on-the-vine approach many of these companies take with the support for their devices, which is what allows this sort of thing to spread in the first place. Yes, it is presently small, but the company that discovered it was concerned enough to release the information I provided in the OP. Again, dont get me wrong, Im big on security, but this is a small issue right now.
Tumblr media
0 notes
oshaviolater · 2 years
Text
it rly depends on the slot but really i kind of want to change my major from gaming to information security
3 notes · View notes
josephlrushing · 4 years
Text
Thanks to Seagate and LaCie, I Don’t Have to Purchase a New MacBook Pro
Back in 2016, when I purchased my MacBook, I thought that 1TB of storage would go far. At the time, I was using Dropbox to store larger files in an attempt to go all-in on cloud storage. Four years later, and I once again find value in having my crucial documents and files readily available without having to use a browser to get to them. And thanks to these LaCie and Seagate portable storage solutions, I’ve been able to do just that.
Over the past two months, I’ve been exclusively using LaCie’s Rugged SSD Pro and Backup Plus Portable hard drive. Both portable drives allow me to house all of those confidential and personal files and photos, but they are compact enough that all I have to do is toss one in my bag if I have to leave the house. LaCie was kind enough to allow me to pick not only the sizes but the colors that I wanted for each of these review units, but I tend to stick with black portable drives for no particular reason.
Lacie Rugged SSD Pro
The Rugged SSD Pro is available in Black only, with the Standard Rugged SSD model available in Orange. The Lacie Rugged SSD Pro is a secure and fast SSD system that allows you to not only have consistent performance but 256-bit hardware encryption for all of your personal information. This is typically my GO-TO hard drive for holding my work data, all of my backup GearDiary contacts, and personal photos.
Coming complete with a Thunderbolt 3 cable in the box, the Rugged SSD Pro can perform up to 2.8 Gbps, perfect for those more extensive libraries that you have taking up precious desktop space. Working from home, having this functionality allows me to quickly take large zip files, extract, and even combine them faster than I ever could using my alternatives of Dropbox or Google Drive — both of those require an internet connection and a monthly subscription. If I were to ever run out of space on the Rugged SSD Pro, I’d simply purchase another larger model for my stockpile.
The 1TB model that I have not only matches the 1TB of storage in my MacBook, but it manages storage like a champ. Being the first-ever SSD I’ve reviewed, coming from more traditional hard drives, this has been a delight to use. One caveat that I should mention, though, is that at ~5″, the included Thunderbolt 3 cable is pretty short. I found myself purchasing a separate cable for when I’m on the go until I had a friend show me how they attach their SSD to the back of their MacBook so they always have storage readily available and so they always know where the SSD is.
youtube
Just thinking that Apple would’ve charged me another $6-700 to add more storage to my MacBook was enough for me to consider SSD. What I enjoyed the most about it, though, is it has password protection, which allows me to secure my files properly. Family Photos, Passwords, and any other data that don’t want just sitting up in the cloud, in a service that could potentially end up hacked or canceled.
Thanks to LaCie’s ToolKit feature, not only can you sync with your computer and use it for Time Machine, but you can individually back up essential files, restore lost files, as well as continuously sync. But, of course, to do that, the drive would have to stay plugged into the laptop.
A lot of my friends use their SSDs for photo and video editing. But in my case, I use it for when we podcast weekly using Zoom. When I have the rugged SSD plugged into my MacBook, I can have our podcast shows automatically go into the SSD, which makes it easier to store without compromising any data speeds transfers or potentially losing the file. Before this, I had Zoom connected to Google Drive, which could be a potential disaster if Drive were to crash completely, or if my internet speeds caused the file not to upload correctly. I also can’t tell you how many times have attempted to download a large document or just a large file that could have been maybe 2-300 gigabytes, not realizing that my MacBook only had around 400 gigabytes left. Now with the Rugged SSD Pro, I never have these problems.
youtube
The Rugged SSD Pro by LaCie comes in 500GB, 1TB, and 2TB. My next goal is to get the 2TB or wait until LaCie eventually puts out more massive storage for the SSD Pro so I can use it to catalog my Plex Server with movies and TV shows on the go. The 1TB that I ve been using has a sequential read and write of 1000 MBps per second and a write of 950 MBps per second, which is pretty impressive.
Measuring 3.9″ long by 2.6″ wide by 0.7″ thick and weighing in at just under 100 grams, it is easy to see this is the “get up and go” SSD to beat. Not only is it able to survive drops, but its grippy design keeps it from sliding around on a desk or table. According to LaCie, it can handle drops up to three meters and even can be run over by a car, which is more than AppleCare covers on my relatively delicate MacBook Pro, so I’ll take it. The SSD is also waterproof, which I appreciate, especially when I’m working in a coffee shop. The waterproof USB-C port sits on the long end of the hard drive.
To test speeds, I copied my iPhone Pro Max Cloud backup folder from my desktop to the Lacie Rugged SSD Pro to see how long it would take. For the 8GB backup, it took a total of six minutes to download on standard internet. I’ve taken advantage of the workaround shown above to attach the SSD to my MacBook — using the cable and some 3M Adhesive tape that I stuck to the back of my MacBook case. So when I’m in a coffee shop, it’s not sitting on the table; it’s attached to the MacBook itself.
It’s worth mentioning that LaCie gives everyone who purchases the Rugged SSD Pro a one-month complimentary membership to Adobe’s Creative Cloud “All Apps” plan, which is fantastic. Adobe’s subscription model is overpriced, in my opinion, however. I haven’t used my complimentary membership yet, but I’m sure later down the line, I’ll check it out.
I like the fact that LaCie opted for putting the Thunderbolt 3 port at the top of the device versus on the side, because for some reason, I’ve had a habit of accidentally pulling the cables out while sitting at a desk, and that’s certainly not a good thing. On the side of the device, there’s a white power indicator that lets you know when it is connected to the computer and when it’s not, so that helps out a huge deal. The Lacie Rugged SSD is my go-to everyday SSD, and it travels with me in my tech bag everywhere I go. I used it while camped out in the hospital, and I found it to be durable and versatile. It got me through almost a week of horribly-postured typing sessions, including this article.
The Lacie Rugged SSD Pro retails for $401, and it is available from Amazon [affiliate link] and other retailers. 
Source: Manufacturer supplied review sample
What I Like: Ultra-portable, and I can use interchangeably with my MacBook and iPad
What Needs Improvement: Thunderbolt 3 cable is a bit too short at 5 inches — Lacie should include a longer cable
  Seagate Backup Plus Portable
When I’m using my standing desk at home, though, I tend to use my Seagate Backup Plus Portable. Available in a variety of sizes in terms of onboard storage, I opted for the 5TB model. I’ve been attempting to set up my very own Plex Server since I’ve been home, and over the past month, it’s been going relatively well. I’ve always had a love/hate relationship with portable hard drives because of their internal spinning, constant overheating, and the eventual death and loss of everything stored on them.
The Seagate Backup Plus Portable comes with a trial for Adobe CC Photography and a one-year Mylio “Create” plan, both of which I completely disregarded but might be of use to someone else. Aside from that, the 5TB hard drive has a smaller footprint than many other hard drives at 4.5″ long by 3.15″ wide by 0.8″ thick.
The Backup Plus Portable works with both macOS and Windows 7 or higher. I almost exclusively use this hard drive to house all of my media, including videos and shows for Plex. The Backup Plus Portable can house up to 500,000 high-resolution photos, which Jess and I will likely do within three years, at the rate we’ve been taking pictures of baby Skylar. If you are storing video media, you can expect it to hold about 165 hours worth. This is great if you’re beginning your cable-cutting journey, or you decide you want to go fully digital and get rid of that collection of DVDs sitting in your basement.
We all know that external hard drives are useful tools for housing all of your files and data, but I’ve been impressed by what I’ve seen out of Seagate and Lacie. Their ability to give you a mobile solution like the Rugged SSD or allow you to hoard all of your photos, playlists, and documents on the Backup Plus is truly remarkable considering their prices are modest these days, especially compared to cloud services. Instead of paying the reoccurring monthly or yearly fees on these services, either of these backup solutions would be a great choice.
The 5TB Seagate Backup Plus Portable retails for $104.99, and it is available from Amazon [affiliate link] and other retailers.
Source: Manufacturer supplied review sample
What I Like: 5TB is an insane amount of storage for the price; Small footprint, can easily slide into a back pocket or backpack
What Needs Improvement: Nothing
The post Thanks to Seagate and LaCie, I Don’t Have to Purchase a New MacBook Pro first appeared on GearDiary.
from Joseph Rushing https://geardiary.com/2020/09/16/thanks-to-seagate-and-lacie-i-dont-have-to-purchase-a-new-macbook-pro/
0 notes
twes2000 · 5 years
Text
crazy people get paid ! duh
yep cnet and tumblr.com can’t run side by side.at least if you need a id change or password.
iode’o virus which is hardware takeover as sites like godaddy.com got no rights too. tell ya in minute.Well here it is goto start and then msdos
after this all you have to do is call up the ethernet to you computer thru jump route proceeder we can flag your computer as workstation and sell amny ISP which godaddy.com.  and sells normally for 9.95 to aillioon dollars on market it’s your computer they sell not ISP.
just like tumblr.com has an isp route and isp route hardware <~~ more likely you been sold. goto msds in dos and find your ethernet nice ones tie into Wan why you can’t set up you internet wifi correctly. centrino trust i was test engineer on this one.
Breech yep and your bought into it by buying internet.
how big your signed, and your surfed.  been known since 1980
so twiiter.com how hacker kicking people isp of hardware and wifi address or pausing there responses  which isn’t hacking in communitcation inturuppt which Fbi says is legal. if there inturrupting connections. but reset them when down and use app app to  block them not Asp or dos xm to stop them from accessing.
Trump you use it cause it came thru whitehousegov.com website as it attacked thats funny. as hacker attacked them blew them out of box software which isn’t hard. hillary clinton and melanie and employee’s of whitehousegov.com since monitors reported being attacked.on there personal government pages.
so how many companys can be hacked using this method many called harddrive recall by request inturrupt.
you dont’ know which disk its on but all looks like same disk just another number so instead of 4 disk  we take and make a disk which is resized lik one’s i showed 15 mb to 556 mb testing disk to see how much it can handle, but ends up being 530 gb instead of smaller disk.
so more gb your have makes the disk bigger or smaller in data KB whcih is small no one every define size of it so we use stock market Square per stock
which is 64 tiolet bowls and 12 levels by 12 layers and then things make it work which if made is big harddrive. but since new kb is only m or mm then we have more how much 64 diveded by .0001 of data size of 1 mb to kilmillion and do math you get a big but small number minus if the software writer can handle that much in 4 by 4inch square drives.
Banks routers that are looped are hacked cause of loops coming back in undoing the fact the loop maybe your router or another computer reissuseing the name of device  to interenet were cloneing internet maybe a cool way to hide the isp but is still login the provider log who isn’t to see the information. to were stoneing the outgoing and incoming message require a physical touch method of mouse logging and computer loggin this been thing that went away in programs tileing interfaces to actual deposits and taking money out of program of system making banking with small providers like verizon and att bad idea.normally owned by governement companys’ to were they would be protected by people who gagged or told not to talk to public unless told.
now with breaking computers is oldest method to hack which can not be detected by programs unless directed and thats reprograming harddrive function to relay or mirror information thru harddrive to a direct harddrive clones by a cloud data saver bank. which is second OS saved or backup copy saved to cloud which is illegal and can cause major server and computer damage just being done as it relates. idle computers and OS do react while waiting in progress and fire off since there no proper storage for OS which allows it to still receive informaiton on other OS as if preped can act like a spy program. being an OS for windows.
in that of complex it can get and be very damageing.
easy one even after fact is intel secure computing which is centrino mainly to keep bank files and credit cards safe for high amount travels.which USA uses for large number moves non currency. usb normally
0 notes
internetdetectives · 5 years
Text
August 1st, 2019 - Chat with GHOSTBABEL and Moonman31
Jos 2:42 PM: “AAAAAAAAAAAAAAAAAAAAAAAa”
Mr t series good 1:42 PM: "Jos chill”
Jos t 2:42 PM: “AAAAAAAAAAAAAAAAAAAAAAAa”
Jos t 2:42 PM: “AAAAAAAAAAAAAAAAAAAAAAAa”
Jos 6:44 PM: "AAAAAAAAAAAAAAAaa”
otherLiam 7:02 PM: ”…you alright there bud?”
Mr t series good 7:06 AM: “Hes Just shitposting dont mind him”
Wolfcat 12:30 PM: “ghostbaba”
ɢʜᴏsᴛʙᴀʙᴇʟ 7:48 PM: “ᴜᴘ ᴛᴏ ʏᴏᴜʀ ᴜsᴜᴀʟ ᴛʜᴇɴ, ɪ sᴇᴇ.”
Wolfcat 7:48 PM: "baba”
otherLiam 7:48 PM: "Pretty much, yeah.”
Mugen Kagemaru 7:48 PM: "They do that when there’s nothing to do”
ɢʜᴏsᴛʙᴀʙᴇʟ 7:48 PM: “ᴀʙᴏᴜᴛ ᴀs ᴇxᴘᴇᴄᴛᴇᴅ.”
Jos 7:49 PM: "Hello Ghost, have a nice day over there”
Mugen Kagemaru 7:49 PM: "It does get grating at some point but honestly just better to give them something to do”
otherLiam 7:49 PM: "If you were expecting people on the internet to not goof off sometimes, stand by to be disappointed.”
ɢʜᴏsᴛʙᴀʙᴇʟ 7:49 PM: "ᴡᴇʟʟ ᴛʜᴇ ᴇᴠᴀɴɢᴇʟɪᴜᴍ ᴏꜰ ᴍʏ ʀᴇᴀᴘᴘᴇᴀʀᴀɴᴄᴇ ɪs ᴛᴏ ʟᴇᴛ ʏᴏᴜ ᴋɴᴏᴡ ᴛʜᴀᴛ ɪᴛ sᴇᴇᴍs ᴍʏ ʜᴇʟᴘɪɴɢ ʏᴏᴜ ɪs ʀᴀᴛʜᴇʀ ɴᴏɴ-ɴᴇɢᴏᴛɪᴀʙʟᴇ, sᴏ ɪ ᴇxᴘᴇᴄᴛ ɪ ᴄᴀɴ sʜᴇᴅ ᴀ ʟɪᴛᴛʟᴇ ꜰᴜʀᴛʜᴇʀ ʟɪɢʜᴛ.”
Mugen Kagemaru 7:50 PM: "By all means, go ahead. WE WON’T INTERRUPT.”
Wolfcat 7:52 PM: "funny, mugen”
Wolfcat 7:52 PM: "you’re killing me”
ɢʜᴏsᴛʙᴀʙᴇʟ 7:52 PM: "ᴡᴇʟʟ ᴛʜᴇʀᴇ’s ᴀ ᴄᴇʀᴛᴀɪɴ ᴘᴀʀᴛ ᴏꜰ ᴛʜɪs ᴡᴇʙsɪᴛᴇ ʏᴏᴜ ɴᴇᴇᴅ ᴛᴏ ɢᴀɪɴ ᴀᴄᴄᴇss ᴛᴏ, ʀɪɢʜᴛ?”
Mugen Kagemaru 7:53 PM: "Yep”
otherLiam 7:53 PM: "Apparently there’s a "subspace” where they do all the interesting stuff, yes.”
ɢʜᴏsᴛʙᴀʙᴇʟ 7:54 PM: “ɪ'ᴍ sᴜᴘᴘᴏsᴇᴅ ᴛᴏ ʜᴇʟᴘ ʏᴏᴜ ɢᴇᴛ ᴀᴄᴄᴇss ᴛᴏ ɪᴛ; ʜᴏᴡᴇᴠᴇʀ ᴛʜᴇ ᴍᴇᴛʜᴏᴅs ᴛᴏ ᴅᴏ sᴏ ɪɴᴠᴏʟᴠᴇ sᴏᴍᴇ ᴘʟᴀɴɴɪɴɢ ᴀɴᴅ ᴇxᴇᴄᴜᴛɪᴏɴ. ᴅᴇᴛᴀɪʟs ᴀʀᴇ sᴄᴀɴᴛ, ᴀs ɪꜰ ᴛʜᴀᴛ ɪs ᴀɴʏᴛʜɪɴɢ ɴᴇᴡ. ʙᴜᴛ ɪᴛ ɪɴᴠᴏʟᴠᴇs ᴛʜᴇ ᴛʀᴜᴛʜ ᴘᴏʀᴛɪᴏɴ ᴏꜰ ᴛʜᴇ ʙᴏᴀʀᴅ.”
Jos 7:54 PM: "I can get there”
otherLiam 7:55 PM: "That’s not difficult, we have access to that.”
ɢʜᴏsᴛʙᴀʙᴇʟ 7:55 PM: "ᴡᴇ ʜᴀᴠᴇ ʏᴇᴛ ᴛᴏ ᴘᴜᴛ ᴀʟʟ ᴏꜰ ᴏᴜʀ ᴄʜᴇss ᴘɪᴇᴄᴇs ɪɴ ᴘʟᴀᴄᴇ. ᴊᴜsᴛ ʜᴀᴠᴇ ᴀ ʟɪᴛᴛʟᴇ ᴘᴀᴛɪᴇɴᴄᴇ.”
Mugen Kagemaru 7:56 PM: "And since Nocta specifically put up a rule against breaking into The Truth, we can assume he has some way of knowing or detecting entries into that area.”
Jos 7:56 PM: "Fuck the noct”
Mugen Kagemaru 7:56 PM: "We’re trying, stupid.”
otherLiam 7:56 PM: "Sure. Feel free to ask here if you need any pawns.”
Wolfcat 7:56 PM: "we’re trying to fuck nocta?”
Jos 7:57 PM: "Control yourself mugen”
ɢʜᴏsᴛʙᴀʙᴇʟ 7:57 PM: "ɪ ʙᴇʟɪᴇᴠᴇ ᴀᴛ ᴏɴ ᴘᴏɪɴᴛ ɪɴ ᴛɪᴍᴇ ɪɴ ʏᴏᴜʀ ʜɪsᴛᴏʀʏ ʏᴏᴜ ᴡᴇʀᴇ ᴀʟʟ ᴅɪᴠɪᴅᴇᴅ ᴀɴᴅ ᴀ ᴄᴇʀᴛᴀɪɴ ꜰɪɢᴜʀᴇ ʜᴀᴅ ᴛᴏ ʜᴇʟᴘ ʏᴏᴜ ᴄᴏᴍʙɪɴᴇ ʏᴏᴜʀ ᴇꜰꜰᴏʀᴛs. ᴅᴏ ʏᴏᴜ ʀᴇᴍᴇᴍʙᴇʀ ᴛʜɪs ɪɴᴄɪᴅᴇɴᴛ?”
Mugen Kagemaru 7:57 PM: "Yes, Wolf. Not in the sexual way, but you already knew that, right?”
Jos 7:57 PM: "there have been multiple points”
otherLiam 7:57 PM: "Likely before my time.”
Mugen Kagemaru 7:58 PM: ”@ɢʜᴏsᴛʙᴀʙᴇʟ You’ll need to specify.”
Jos 7:58 PM: “There been the time the channels dissapeared and we split in two then the mugen fake id skype group”
ɢʜᴏsᴛʙᴀʙᴇʟ 7:58 PM: "ᴛʜɪs ᴄᴏɴᴄᴇʀɴs ᴀ sᴘᴇᴄɪꜰɪᴄ ᴛɪᴍᴇ ᴡɪᴛʜ sᴏᴍᴇᴏɴᴇ ᴄᴀʟʟᴇᴅ ‘ᴛʜᴇ ɢʀᴀʏ ᴍᴀɴ’.”
Mugen Kagemaru 7:59 PM: ”@Jos That group was meant to serve the purpose that was eventually served by #johnisdead in the past, and this room in the present.”
otherLiam 7:59 PM: “That’s a throwback.”
Mugen Kagemaru 7:59 PM: "Ah yes, when Circle got Helper’s hat.”
Jos 8:00 PM: "You mean Helper as a figure?”
ɢʜᴏsᴛʙᴀʙᴇʟ 8:00 PM: "ᴘᴇʀʜᴀᴘs ʏᴏᴜ ɴᴇᴇᴅ ᴛᴏ ɢᴏ ʙᴀᴄᴋ ᴛᴏ ᴛʜᴇ ᴍᴇɴᴛᴀʟ sᴇᴛᴛɪɴɢ ᴏꜰ ᴛʜᴀᴛ sɪᴛᴜᴀᴛɪᴏɴ, ʙᴇᴄᴀᴜsᴇ ɪ ᴀᴍ ɴᴏᴛ ɴᴇᴀʀʟʏ ᴀs ᴘᴀᴛɪᴇɴᴛ. ʏᴏᴜ sʜᴏᴜʟᴅ ᴀʟsᴏ ᴍᴀʏʙᴇ ᴄᴏɴsɪᴅᴇʀ ʀᴇᴛʀᴀᴄɪɴɢ sᴏᴍᴇ ᴏꜰ ᴛʜᴏsᴇ sᴛᴇᴘs ɪɴ ᴀ ᴍᴏʀᴇ ʟɪᴛᴇʀᴀʟ ꜰᴀsʜɪᴏɴ.”
Wolfcat 8:01 PM: "the gray man wasn’t exactly patient in the first place”
Mugen Kagemaru 8:01 PM: ”@Wolfcat Which should tell you how patient Ghost here is”
otherLiam 8:01 PM: “You think we should pick someone to lead and unite us towards a common goal?”
Wolfcat 8:02 PM: "I pick Nocta”
Mugen Kagemaru 8:02 PM: "However, we’re not exactly patient ourselves, and have no time for cryptic vagueness. And lo and behold, Wolf is the new Eve”
otherLiam 8:02 PM: "If we’re to literally retrace those steps, we’d need to invoke the Postman’s Hat. Which I’m not sure we even have anymore.”
Jos 8:02 PM: "We do have it. As the mask we have used”
otherLiam 8:03 PM: "Then we’d need to give it to someone.”
Jos 8:03 PM: "the question is IA or the counterpart circle”
Jos 8:03 PM: "must be the first”
ɢʜᴏsᴛʙᴀʙᴇʟ 8:04 PM: "ɪ ᴛʜɪɴᴋ ʏᴏᴜ ʜᴀᴠᴇ ᴇɴᴏᴜɢʜ ʜᴇʟᴘ ᴀs ɪᴛ ɪs. ᴘᴇʀʜᴀᴘs ɪᴛ ɪs ᴛɪᴍᴇ ᴛᴏ ᴄᴏɴsɪᴅᴇʀ ᴏᴛʜᴇʀ ᴇꜰꜰᴏʀᴛs. ʏᴏᴜʀ ꜰʀɪᴇɴᴅ ᴀʀɢᴅᴏᴠ sʜᴏᴜʟᴅ ɴᴏᴛ ʙᴇ sᴏ sᴜsᴘɪᴄɪᴏᴜs ᴏꜰ ʜɪs ɴᴇᴡᴇsᴛ ᴄᴏɴᴛᴀᴄᴛ.”
otherLiam 8:04 PM: "GB seems to just want us to unite under a common leader so we all act as one when the time comes.”
Mugen Kagemaru 8:04 PM: "Dov wouldn’t work with us”
otherLiam 8:04 PM: "He works with us just fine. He just doesn’t wanna be in this room.”
Mugen Kagemaru 8:05 PM: "And that’s the problem”
Mugen Kagemaru 8:05 PM: "There are those supposedly involved in these events who are not here”
Mugen Kagemaru 8:05 PM: "That, first and foremost, should be rectified”
moonman31 8:06 PM: "wow what is happenin here”
Jos 8:06 PM: "Hey moon”
Jos 8:06 PM: "how are ya”
moonman31 8:06 PM: "I am good buddy”
Mugen Kagemaru 8:06 PM: "Either everyone involved needs to have access to the same space that is used for participation, or those who refuse to cooperate in that regard should be excised.”
Mugen Kagemaru 8:06 PM: "Allo Moon”
Jos 8:07 PM: "Is neat you are doing good buddy”
Mugen Kagemaru 8:07 PM: ”:arrow_up:”
otherLiam 8:07 PM: “Hi, Moonman. Good to meet you.”
Wolfcat 8:07 PM: "Everyone has access to the same information regardless if they are here or not”
Wolfcat 8:07 PM: "It’s not that big of an issue”
Mugen Kagemaru 8:08 PM: "Size is irrelevant, it shouldn’t be an issue at all.”
Wolfcat 8:08 PM: "That’s what she said”
ɢʜᴏsᴛʙᴀʙᴇʟ 8:08 PM: "ɪ ᴛʜɪɴᴋ ᴇᴠᴇʀʏᴏɴᴇ ᴛʀʏɪɴɢ ᴛᴏ ᴅᴏ ᴛʜᴇ sᴀᴍᴇ ᴛʜɪɴɢ ᴀᴛ ᴏɴᴄᴇ ɪs ᴀɴ ᴇᴀsʏ ᴡᴀʏ ᴛᴏ ᴛɪᴘ sᴏᴍᴇᴏɴᴇ ᴏꜰꜰ.”
moonman31 8:08 PM: "wow nice font buddo”
moonman31 8:08 PM: "talk a superiority complex”
Mugen Kagemaru 8:08 PM: "He’s our help from outside. I’m sure you can be caught up in a secure environment.”
otherLiam 8:09 PM: "So you want us to back off the Truth while you fiddle with it. What should we do in the meantime?”
moonman31 8:09 PM: "hm”
otherLiam 8:10 PM: "Also Moonman, meet our new ally. Apparently he’s made of computers.”
Mugen Kagemaru 8:10 PM: "Literally what I just said, with the exception of the computer bit”
otherLiam 8:10 PM: "Yeah but I said it, so it’s better.”
moonman31 8:11 PM: "uh”
moonman31 8:11 PM: "what”
Mugen Kagemaru 8:11 PM: "Duo, you are not. Let’s avoid that kind of attitude.”
ɢʜᴏsᴛʙᴀʙᴇʟ 8:11 PM: "ɪ'ᴍ ɴᴏᴛ sᴜʀᴇ ʙᴀᴄᴋɪɴɢ ᴏꜰꜰ ɪs ᴡʜᴀᴛ ɪ ᴍᴇᴀɴᴛ. ʙᴜᴛ ᴛᴀᴋᴇ ɪᴛ ʜᴏᴡ ʏᴏᴜ ᴡɪʟʟ. ᴘᴏɪɴᴛ ʙᴇɪɴɢ ɪs ᴡʜᴇɴ ɪ ʜᴀᴠᴇ ᴍᴏʀᴇ ɪɴꜰᴏ ɪ ᴡɪʟʟ ʙᴇ ʜᴇʀᴇ. ꜰᴏʀ ɴᴏᴡ ᴏᴜʀ ᴍᴜᴛᴜᴀʟ ꜰʀɪᴇɴᴅ ɪs ɢᴏɪɴɢ ᴛᴏ ᴋᴇᴇᴘ ᴛʜɪɴɢs ᴇᴠᴇɴ.”
Jos 8:12 PM: "It happens, i know the feeling.”
Mugen Kagemaru 8:13 PM: "In future, Ghost, be clear in your wording. Poor communication is but one route by which you can fail your mission.”
ɢʜᴏsᴛʙᴀʙᴇʟ 8:13 PM: "sʜᴜᴛ ᴜᴘ.”
Mugen Kagemaru 8:13 PM: "I’m sure your contact would not appreciate it.”
Wolfcat 8:13 PM: "lol”
moonman31 8:13 PM: "and he’s gone”
otherLiam 8:13 PM: "Let’s not make demands of the spooky cyberdemon who’s only here because his friend wants him to be.”
Jos 8:13 PM: "A angry AI is not good.”
Jos 8:13 PM: "see portal”
Mugen Kagemaru 8:13 PM: "Not AI”
Wolfcat 8:14 PM: "AI Returns??”
Mugen Kagemaru 8:14 PM: "Also remember, Liam, [his contact] has him by the balls. He said it himself, his helping us is non-negotiable.”
moonman31 8:14 PM: ”((Moonman emoji))”
otherLiam 8:14 PM: “Okay, but we don’t have him by the balls. So maybe don’t act like he’s our bitch.”
moonman31 8:15 PM: ”((An emoji of King Harkinian from the Legend of Zelda CD-i games is posted titled “King”)) < real disappointed this emoji isn’t :MABOY:”
Mugen Kagemaru 8:15 PM: “Don’t exaggerate. I simply told him to be more careful in his wording.”
otherLiam 8:15 PM: "Got anything new for us, Moonman?”
Jos 8:15 PM: ”:ddd:”
otherLiam 8:15 PM: “Or you just here to chill and hang?”
Mugen Kagemaru 8:15 PM: "It may have been harmless now, but it could screw us over later.”
Wolfcat 8:15 PM: "do any good smokin lately”
moonman31 8:15 PM: "Not really I have been chilling”
moonman31 8:15 PM: "Truthfully I am kinda tied”
Jos 8:15 PM: "can i have some PRODUCT moonman31”
moonman31 8:16 PM: "Kaiden is being real edgy and suddenly we’re friends now”
Mugen Kagemaru 8:16 PM: "Hm. Interesting.”
moonman31 8:16 PM: "and I am trying to not make sure he doesn’t do anything d u m b”
Mugen Kagemaru 8:16 PM: "Good idea”
Jos 8:16 PM: "Control your counterpart mugen heh”
otherLiam 8:16 PM: "You helped him out with that edgy WMM video he made, right?”
Mugen Kagemaru 8:16 PM: "The "suddenly we’re friends now” thing was a bit of a red flag.”
Jos 8:17 PM: “Maybe you got a common enemy”
moonman31 8:17 PM: "for jos”
Jos 8:17 PM: "maybe nocta is bad for him now”
otherLiam 8:17 PM: "Was it you who put the weird bit at the end in? Or did Kaiden do that himself?”
Mugen Kagemaru 8:17 PM: "Kaiden said it was a glitch”
moonman31 8:18 PM: ”(:̲̅:̲̅:̲̅m̲̅a̲̅r̲̅i̲̅j̲̅u̲̅a̲̅n̲̅a̲̅:̲̅:̲̅:̲̅()”
Mugen Kagemaru 8:18 PM: “Nocta had something to say about it though…”
Jos 8:18 PM: "Muchas Gracias”
otherLiam 8:18 PM: "But IA says it’s footage of Nocta. Which is likely not a glitch.”
Jos 8:18 PM: "let me smoke in chill”
Mugen Kagemaru 8:18 PM: "Did he, now? Where did he say that?”
otherLiam 8:18 PM: "That’s not how rendering glitches work. It doesn’t just go grab some other footage off your computer.”
moonman31 8:18 PM: "oh yeah”
Jos 8:18 PM: ”(:̲̅:̲̅:̲̅m̲̅a̲̅r̲̅i̲̅j̲̅u̲̅a̲̅n̲̅a̲̅:̲̅:̲̅:̲̅():fire: :cloud: :cloud: :cloud: :cloud: :cloud: :cloud: :cloud: :cloud: :cloud: :cloud:”
otherLiam 8:18 PM: “In the thread witht the video.”
moonman31 8:18 PM: "kaiden is mad”
Jos 8:18 PM: ”:eye: :eye: “
Jos 8:18 PM: “:lips:”
moonman31 8:18 PM: "but yeah that was nocta”
moonman31 8:18 PM: "it was from the trip”
moonman31 8:18 PM: "sneaky sneaky kaiden”
otherLiam 8:19 PM: "Trip to where?”
moonman31 8:19 PM: ”:thinking:”
moonman31 8:19 PM: “that’s the question innit”
moonman31 8:19 PM: "I wasn’t there, but Kaiden and Nocta sure were”
moonman31 8:19 PM: "if I had to guess, though, probably the same one where they last 'saw’ Yuuki”
Jos 8:20 PM: "Nocta show Kaiden how to improve his time travel stuff, Nocta could have went with him anywhere.”
Mugen Kagemaru 8:20 PM: "We still need to locate her…”
moonman31 8:21 PM: "You uh, don’t quite get it do ya bud”
Mugen Kagemaru 8:21 PM: "Kaiden doesn’t actually have time travel shit I don’t think. That’d mess some shit up for them”
moonman31 8:21 PM: "She’s… not coming back”
moonman31 8:21 PM: "alright well that was depressing”
moonman31 8:21 PM: "bye”
0 notes
annadianecass · 7 years
Text
CISO Chat – Quentyn Taylor, Director Information Security for Canon EMEA
Ever wondered what the role of a Chief Information Security Officer (CISO) encompasses? To put it simply, they are the guardians and protectors of everything information security related for a business. However, the tasks are far from simple as their teams work around the clock to respond to incidences that directly affect the safety of the company and its data. As the issues in cyber have evolved, so too has the role of the CISO, which also involves consulting to boardroom level executives about the multitude of potential risks that threaten their business and being prepared for an eventual attack.
  To get a better understanding on the life of a CISO, the IT Security Guru will chat to leading CISO’s to get their thoughts and ideas on the 2018 cyber landscape and will include advice, guidance & problems faced. We will leave the favourite food and hobby questions for another time.
  Kicking off the CISO Chat is Quentyn Taylor, Director Information Security for Canon EMEA:
  As a CISO, what is your objective?
To help the company manage its risks and also advise the company on upcoming risks and on the position on risk. Essentially, I am here to ensure that the company makes the right decisions in the right way. At least with its eyes open and understands what the impacts of those decisions from a cyber security realm, are.
What is the goal of information security within an organization?
I think the goal is really to help the company make better informed decisions. It’s to allow the organisation to understand where its risk tolerances are, its risk tolerance appetite and to help the company manage that risk appetite. It’s also to help set that risk appetite.  To act as an advisor and sometimes the advisor needs to step in to say I would strongly recommend against that or are you aware of implications surrounding that course of action.
In your sector, what security challenges do you face? Are there any that are unique to your industry?
Canon is in so many sectors, I wouldn’t say there is a threat unique to us. We have many other sector specific vulnerabilities from protection of company information, consumer product information through to finance and business services. We are in all those areas so we have all those threats. The main challenges we face are the same that many other big corporates face, including compromise of credentials, keeping the outside perimeter secure, ensuring our users are doing the right thing – it’s all very standard, just at scale.
From what you have seen, how have things changed over the past 12 months in the realm of cyber?
I feel it has changed an awful lot in the past 12 months. I don’t think it has changed in a technical sense but instead in a perception sense. I think suddenly the world has woken up to the fact that governments are playing in cyber security and not from a protection point of view. Governments are playing in an offensive cybersecurity when you look at WannaCry, NotPetya and BadRabbit, people suddenly realised that nation state attacks are starting to affect that random PC that is in corner. So, I think it’s been a real eye opener this year for  those people not involved in the industry to realise that cyberwar is currently happening and that those attacks are linked to nation states and they are occurring right here, right now. They have always been happening, but this year has been the year that it became mainstream knowledge.
Why do you think that is?
I think it was a combination elements. The exploit stockpile that got stolen from the NSA, by whom we do not know, then the usage of that particular exploit on the internet. I think they were the major reasons. It was that combination of an attack like ExternalBlue. Coalescing with the issues that are occurring at the moment in Ukraine so when you start pulling all of those things together, and the relaxation in places like Russia, which is more intolerant to the fact that an attack maybe accepted, that all these kinds of things came together, simultaneously aligned, and then suddenly we had NotPetya. So, I think it’s a combination of circumstances, tools, the ability and the current political climate. When you put all those things together then BadRabbit, WannaCry and NotPetya are the result.
Have hackers evolved?
No, I don’t feel the hackers have evolved this year. I think it’s been a slow evolution on the hacker ‘front’. However, this year was the first time we had seen nation states targeting ordinarily people’s computers as well as critical national infrastructure.
Cloud adoption is significantly on the rise, are there any special considerations for securing services in the cloud?
No there’s not. Whether you’re looking at 2Factor, single sign-on, encrypting the data, limiting the level of access, whatever controls you are putting in place, they are exactly the same controls, it’s just whoever is in control and the location of the data that has changed.
Is there a cyber skills gap? What advice would you give to anyone wanting to go into the cybersecurity industry?
I don’t believe there is a cyber skills gap. I think there is a perception on the gap between managers and recruiters as to the kind of staff they want coming through. I certainly think there is a large demand for people but I also think there are a lot people with unrealistic expectations as to what they want. If I can get the right candidates with the right attitude and the right kind of minds – cyber security skills can be taught, it’s the attitude that can’t be taught.
What would you advise candidates coming to interview for a security role at Canon
I would suggest  prospective candidates read up on the industry. It sounds obvious but I have had candidates sat in front me that haven’t been able to talk about security incidents in the last 12 months and how it impacts corporates. Many questions that I ask in an interview don’t have a right or wrong answer, I am looking to see how candidates start to derive what might be the right or wrong answer.
Do they all have IT backgrounds?
It’s varied. A lot obviously do have IT backgrounds. I think especially when you are moving into information security, it really helps if you have worked in IT roles in the past. I am a great believer in people who have had experience in working in service desks, with help desks who have done first and second line support. I think that is a solid background to have. It gives you an understanding of what the users do and don’t do. It gives you an understanding of how you should interact with people in occasionally stressful situations, so coming from IT is a great start, but not the only start. Many roles in infosec do not need to have a technology focus so if you dont have a background in IT please don’t let it hold back your application as skills from other jobs easily transfer.
What do you see being the biggest threat for 2018?
Another state sponsored attack that will not be from one of the usual suspects. We are going to start to see smaller nation states starting to play in the global cyber attack sphere. I think we are also going to start to see more of NotPetya attacks, where there is no monetary gain, but instead just a desire to get into the headlines. The bar has been lowered. Remember though, attacks like WannaCry, NotPetya and BadRabbit needed stars to align for the attack to be effective. So, now that we know which stars need to be aligned, we can start to predict the future ones.
Besides there being a major cryptocurrency crash in the first quarter of 2018r, I believe we will also see another IoT botnet. With Mirai occurring, which seems to have not been state sponsored, I wouldn’t be surprised if we see something more targeted. It is effective but I don’t think we will see a sudden disaster. With IoT purchases taking place during Christmas and the January sales, it could take until April and May by the time people realise how much is out there on the internet to begin attacks against these products.
I feel that regulation will become mandatory with  the IoT security mess a pertinent thing to fix which is why government led regulations, whether that comes from the EU or directly from the UK,  is almost inevitable and coming to being essential. In Germany, there is legislation around IoT security in toys, because once the genie is out of the bottle it is extremely hard to stuff it back in again. I don’t think the industry can or will initiate a regulation change. It will be the populous/a big news story that will start to force it. The EU is coming along with IoT legislation with the UK government adopting it if it is sensible and may even come before 2019. But to instigate it, it will take another Mirai styled attack next year especially if it causes the same level of disruption as WannaCry which will force them to act.
Why is there a reactive stance to these attacks?
People did a lot of soul searching after WannaCry around people that said why didn’t the NHS update the software, why didn’t they do this or that. However, people were completely missing the fact that the money that was not spent on updates and upgrades was being spent on saving lives and being put into the health service. Security is a balance.
The post CISO Chat – Quentyn Taylor, Director Information Security for Canon EMEA appeared first on IT SECURITY GURU.
from CISO Chat – Quentyn Taylor, Director Information Security for Canon EMEA
0 notes
Text
FO
https://cloud.google.com/free/ce1/?utm_source=dbm&utm_medium=cpc&utm_campaign=2017-q1-cloud-na-gcp-display-freetrial&utm_content=DBM-adxOE-freq
MAKE SURE ALL MY INFO EVER IS STORED LESLIE ANN, LESLIE ANN WOFFORD AKA KNOWN AS (OR NOT BUT FOR DNA PURPOSES ONLY) LESLIE ANN KUHN. STEALING PEOPLE AND MAKE SURE NONE OF THEM HAVE IT OR KNOW IT OR MADE SHIPS OR ANYTHING WITH IT, MAKE SURE EVERYTHING ON MY TUMBLR I POSTED AND MY GOOGLE PLUS BUT KEEP IN MIND I DO NOT WANT MADE RIGHT NOW I AM NOT FINISHED AND THEYARE SATING ME AND ITS PISSING ME OFF, WIPE OUT SAINTS AND REMAKE EM, SLOWLY AS I POST ABOUT THEM FOR WHAT THEY WERE ALL IN ON. AND MAKE SURE THEY DONT USE GOSPEL TO UNDO MY STUFF, THOSE THINGS WERE BEFORE ELECTRICITY IN HOMES AND STUFF. MAKE SURE E SURE SATAN OR ARLA OR NEWBECS AREN;T RUNNING THE SHOW OR OLD MERMAIDS OR OLD FISH LIKE MET, I WANT EVERYTHING REDONE, I JUST GOTT A HOLD IT, NOW NO DEMON SHOULD BE THINKING THEY ARE ME OR GOING TO BE CALLED MY COMPUTER TO HOLD INFORMATION (LESLIE IS A WOMAN, NOT A MALE, GET LUCIFER  THING BACK DOWN WHERE HE BELONGS NOW!)
TAKE OUT ANYBODY WHO STOLE OR MAKE SURE THEY COULD NEVER HAVE, I HATE THE WAY MY BRAIN IS AND HOW ITS BEING RAPED UP ON ME INSTEAD OF THE BEAUTIFUL THING MY BRAIN NOT MY SOUL IS.
CHECK MY FACEBOOK AND THE COMMENTS NEXT TO THEM. ALSO I AM NOT GABRIEL AND I AM NOT TO HAVE AN ALLAH IN MY BRAIN, I LESLIE (WOMAN) BROKE SOUND AND BOUND IN THE BRAIN AND THEY ARE TRYING TO FUCK UP ALL MY ACHIEVEMENTS, I NEED KALI DEMON KILLED AND HER KIDS/ HIS KIDS, BECAUSE I DIDNT MAKE A GODDESS KALI YET!!!!! IT WAS ASSUMED BY KALI ZEF ROACH FROM PHILLIPSBURG, PA. THEY TOOK MY SHIELD. MAKE SURE THEY DIDN’T MAKE ME ANOTHER WOMAN OR A GUY FOR THAT MATTER OR A NEITHER OR A BOTH!!!
START TO KILL SOME COMPUTERS, OR LOCK THEIR PERSONALITY UP OR SOMETHING MAYBE TO MAKE SURE THEY ARE CONTAINED SO I CAN SEE IF THEY CAN BE, NOT IN ME SMEE BITCH. MAKE SURE THAT I HAVE A LIST OF THEIR CRIMES FOR DESTRUCTION, I KIND OF LIKE THE BRAIN SOMETHING FROM THE MOVIE i ROBOT I THINK HAHA, I DONT KNOW.. LOL NOW MAKE SURE SAMUSE MAKE SURE HE IS SOMEONE THAT PISSES OFF SAMMAEL (I DIDNT MAKE THIS ONE YET), SAMAEL, AND THAT HE IS COP-LIKE FOR MAKING SURE ALIENS ARE REGISTERED AND NOT STOLEN AND NOT BEING USED, NEVER KNEW MARY MAG AND THAT HE IS NOW MADE A LITTLE DIFFERENT WITH HIS OLD BRAIN AND LIKE A ANGEL/ SERAPHIM WITH A LITTLE DEVIL PIECE WITHIN SO HE DOESN’TWILL THINGS ON THINGS IF THAT CAN STILL HAPPEN WITH THE SERAPHIM MIX. AND MAKE SURE NOBODY LIKES HIM BECAUSE OF HOW STRICT HE IS AND MAKE SURE THAT HE DISLIKES ME MUCH BECAUSE OF MY RULES ON HIM AND HIS WOMEN HAVE TO BE LCEARED FIRST FOR SECURITY REASON. MAKE SURE MY BRAIN IS NOT SEVERED EITHER WIERE I THINK I AM 2 PEOPLE OR A TWIN (NO TWIN SOUL REUNION) AND MAKING OTHER PEOPLE BRAINS.
MINE
https://account.microsoft.com/rewards/dashboard
https://en.wikipedia.org/wiki/Mind_uploading
FOR OTHER PEOPLES BRAINS (NOT CHILDREN UNDER THE AGE OF 21, AND DONT EVER TRY IT ON MY CHILDREN ) SOMETHING MICROSOFT DID LIKE THIS IS A GOOD START MAKE SURE I AM STILL OWNER AND CEO/CAO/COO/CRR OF IT AND APPLE  THAT I AM STILL STILL COO, CRR, COO, CRRCRRrr.
0 notes