|
I usually just put a paperclip or one of those shirt clips on the lock loops
|
# ? Jan 14, 2017 23:16 |
|
|
# ? May 17, 2024 19:25 |
|
i was setting up my new ps4 and it took me like 4 tries to get the password right because it's a 15-character generated one and i couldn't see what i was typing in because of the password entry field if you're gonna use dots for letters at least let the user unmask it like windows
|
# ? Jan 14, 2017 23:16 |
|
Shaggar posted:if you put locks on your bag and they are not TSA the TSA will cut them off but yeah they're useless either way cause of 100 reasons. the only way to secure checked baggage is to get a hard case with a good lock and transport firearms in it along w/ everything else. This is the correct way to transport things "securely." Another way is sometimes at large airports you can get your luggage TSA wrapped which makes it less likely to be tampered with. Otherwise for casual security this "birthday" lock is fine. ate shit on live tv fucked around with this message at 00:24 on Jan 15, 2017 |
# ? Jan 15, 2017 00:04 |
|
ate poo poo on live tv posted:Another way is sometimes at large airports you can get your luggage TSA wrapped which makes it less likely to be tampered with because. what, like they stick a bunch of runes and prayers that ward off tsa agents on your luggage or something?
|
# ? Jan 15, 2017 00:07 |
|
they charge you fifteen bucks to wrap your bag with a pound of cling wrap
|
# ? Jan 15, 2017 00:21 |
|
Kazinsal posted:they charge you fifteen bucks to wrap your bag with a pound of cling wrap Yep.
|
# ? Jan 15, 2017 00:25 |
|
Kazinsal posted:they charge you fifteen bucks to wrap your bag with a pound of cling wrap I only ever see those in lovely airports
|
# ? Jan 15, 2017 00:47 |
|
spankmeister posted:I only ever see those in lovely airports So, like O'Hare or LAX?
|
# ? Jan 15, 2017 00:52 |
|
spankmeister posted:I only ever see those in lovely airports I mean yea. It's useful for going outside the US as well.
|
# ? Jan 15, 2017 01:22 |
|
Kazinsal posted:they charge you fifteen bucks to wrap your bag with a pound of cling wrap i saw a woman in Spain take a tiny paper carrier bag to one of those and come back with a 2 foot diameter ball of plastic. i don't know what the gently caress her plans for it were or how she was going to get it unwrapped.
|
# ? Jan 15, 2017 02:42 |
|
lol if tsa cuts it open the people who buy that sort of poo poo will try to save their 2 pounds of saran wrap too.
|
# ? Jan 15, 2017 02:53 |
|
Wild EEPROM posted:lol if tsa cuts it open the people who buy that sort of poo poo will try to save their 2 pounds of saran wrap too. The TSA specifically DOESN'T cut it open. That's the point. It's sealed with anti-tamper TSA tape.
|
# ? Jan 15, 2017 03:00 |
|
then how do they check it for valuable bomb components
|
# ? Jan 15, 2017 03:10 |
|
ate all the Oreos posted:then how do they check it for valuable bomb components
|
# ? Jan 15, 2017 03:12 |
|
anthonypants posted:they probably do that before in front of you, like if they want to inspect your gun case i mean i only saw the "wrapping" poo poo a couple times a while ago and i seem to remember them being far away from where the TSA was but it was a long time ago so who knows if I'm remembering it right
|
# ? Jan 15, 2017 03:17 |
|
yeah i saw those all over eastern europe
|
# ? Jan 15, 2017 04:37 |
|
Welp
|
# ? Jan 15, 2017 05:02 |
|
https://twitter.com/admung/status/820518665783156736
|
# ? Jan 15, 2017 07:31 |
|
i know what site that's a screenshot of and IIRC it was specifically implemented so that google would stop automatically downloading every possible file and flagging the entire site as a malware host based on false positives (e: whether or not it actually worked, i have no idea)
|
# ? Jan 15, 2017 09:08 |
|
Meat Beat Agent posted:i know what site that's a screenshot of and IIRC it was specifically implemented so that google would stop automatically downloading every possible file and flagging the entire site as a malware host based on false positives Robots.txt?
|
# ? Jan 15, 2017 11:11 |
|
vOv posted:i was setting up my new ps4 and it took me like 4 tries to get the password right because it's a 15-character generated one and i couldn't see what i was typing in because of the password entry field It's 2017, there's no excuse for non optional masking anymore.
|
# ? Jan 15, 2017 23:11 |
|
Cardboard Box A posted:http://www.techrepublic.com/videos/video-rudy-giuliana-explains-how-we-need-to-fix-the-cybersecurity-crisis/ hmmm, yes, that is definitely someone that knows all about cyber security
|
# ? Jan 15, 2017 23:20 |
|
hobbesmaster posted:hmmm, yes, that is definitely someone that knows all about cyber 9/11
|
# ? Jan 16, 2017 01:36 |
|
uhh hello thread, did you have a fun trip to the space between worlds for the last 24 hours?
|
# ? Jan 16, 2017 22:14 |
|
welcome back thread!
|
# ? Jan 16, 2017 22:16 |
|
geonetix posted:welcome back thread!
|
# ? Jan 16, 2017 22:17 |
|
*that mcrib is back comic but with secfuck is back instead*
|
# ? Jan 16, 2017 22:21 |
|
https://textslashplain.com/2017/01/14/the-line-of-death/
|
# ? Jan 16, 2017 22:25 |
|
I guess we're back?
|
# ? Jan 16, 2017 22:28 |
|
blink twice if you've been replaced with a replicant
|
# ? Jan 16, 2017 22:34 |
|
geonetix posted:welcome back thread!
|
# ? Jan 16, 2017 22:36 |
|
Luigi Thirty posted:blink twice if you've been replaced with a replicant
|
# ? Jan 16, 2017 22:36 |
|
Luigi Thirty posted:blink twice if you've been replaced with a replicant i want more life, secfucker
|
# ? Jan 16, 2017 22:39 |
|
just my luck, I get out of kitty jail just in time for the thread to be disappeared <> italy is currently being rocked by a bizarre scandal of the cyber persuasion. the occhionero siblings, entrepreneurs in the finance sector, freemasons and by all accounts smart people (he's a nuclear engineer, she's a chemistry phd), are found to be conducting a multi-year spearfishing campaign against politicians, entrepreneurs and... other freemasons. their spyware appears to have been entirely developed in-house, and it's been active since at least 2011. kaspersky describes it as "amateurish" but I've gotten my hands on a recent sample and it appears to have been developed by someone who, if not a cybercriminal, has at least an idea of how malware analysis is done and how to slow it down. well, at least the anti-analysis protection and obfuscation was, and I know it's not a commercial framework because the few unobfuscated strings are unique to the malware on the other hand, the occhionero siblings made huge, gigantic opsec blunders, and I argue that they had outside help with the malware development, because they clearly aren't serious criminals. consider the strongest piece of evidence against them: the malware exfiltrates data by sending e-mails and uses a commercial component to do so, which requires a license code to unlock. not only the malware contains said license code, but italian police asked the fbi for help, the fbi obtained the name of the licensee, and it was the occhionero brother: the guy had virtually embedded his real name in his phishing malware on the other other hand, when the police came to arrest them, the brother rebooted the bitlocker-encrypted computer and now refuses to provide the password, while the sister locked her smartcard by entering the wrong pin several times. it's not going to help them much because the amount of evidence against them is impressive: they didn't just embed personally identifying information in the malware, they also hosted the c&c server on their company's website, and they talked about their dirty business on regular cleartext phone calls, that the police duly wiretapped all considered, the campaign wasn't terribly successful. of about 18000 targets, only about 10% are estimated to have been compromised the motive is still a mystery. insider trading seems to be the current consensus the malware samples I've seen raise some extremely obvious red flags when run in the simplest of the automated analysis tools, and they're clearly part of a shared lineage dating back years, so it's a little amazing to me that it took so long for it to be noticed
|
# ? Jan 16, 2017 22:49 |
|
this is an interesting and cool post. keep us updated on the details because I've not seen much but ~Trump News~ over this way.
|
# ? Jan 16, 2017 23:12 |
|
hackbunny posted:
Considering how good everyone including myself is at clicking away big red boxes this shouldn't be a surprise.
|
# ? Jan 16, 2017 23:14 |
|
yeah 10% seems on the low-scale, but long-term spearfishing across 18k targets? how many organisations were involved and what was the level of personalisation? where on the hierarchy were the targets mainly based, and were there obvious attempts at avoiding anyone who'd flag malware or inspect it? v interested in the tech details as kaspersky aren't exactly the most reliable on attribution
|
# ? Jan 16, 2017 23:23 |
|
geonetix posted:welcome back thread!
|
# ? Jan 16, 2017 23:23 |
|
|
# ? May 17, 2024 19:25 |
|
secfuck thread: the most secure thread on the forums for 24 short hours
|
# ? Jan 16, 2017 23:30 |