m0ar from the pasta that doesnt fit ----- /cyb/ Movies: >The Machine (2013) >Johnny Mnemonic (1995) >The Matrix (1999) >Chappie (2015) >Elysium (2013) >Virtuosity (1995) >The Lawnmower Man (1992) >Lawnmower Man 2: Beyond Cyberspace (1996) >The Terminator (1984) >Blade Runner (1982) >TRON (1982) >TRON: Legacy (2010) >Escape from New York (1981) >Escape from L.A. (1996) >Rollerball (2002) >RoboCop (1987) >Nirvana (1997) >Transcendence (2014)
/sec/ Movies: >Sneakers (1992) >The Net (1995) >Takedown (2000) >The Fifth Estate (2013) >Blackhat (2015) >Enemy of the State (1998) >Hackers (1995) >WarGames (1983) >WarGames: The Dead Code (2008) >Swordfish (2001)
Jow Forums Movies: >Disconnect (2012) >Antitrust (2001) >Pirates of Silicon Valley (1999) >Office Space (1999) >Her (2013)
/cyb/ Documentaries: >The Cyberpunk Educator archive.org/details/cyberpunkeducator >The Internet's Own Boy: The Story of Aaron Swartz (2014) >RiP: A Remix Manifesto (2009) >TPB AFK: The Pirate Bay Away from Keyboard (2013) >The Net - The Unabomber, LSD and the Internet (2003)
/sec/ Documentaries: >Hackers: Wizards of the Electronic Age (1984) >Hackers Wanted aka Can You Hack It ( (2009) >New York City Hackers (2000) >We Steal Secrets: The Story of WikiLeaks (2013) >Citizenfour (2014) >Terms and Conditions May Apply (2013) >All Watched Over by Machines of Loving Grace (2011) >Snowden (2016) >Zero Days (2016)
Jow Forums Documentaries: >The Code (2001) >Revolution OS (2001) >BBS: The Documentary (2005) >Get Lamp (2010) >From Bedrooms to Billions (2014)
Dear cyber-security students/workers, I'm finishing my degree in Computer Networking in June and I've been seeing a lot of network security jobs going around. They are all pretty vague in their descriptions.
What TF do you guys do all day? Set firewall rules, give people access to networks, pen tests,audits... Is that it? explain to me what a blue-team member does most of his day.
No, I hate stupidity. Is the Social Network a documentary?
Jayden Young
>people used to embed their real names, phone numbers, and postal addresses into the metadata of tracker mod files I weep for the innocence that was lost.
Carson Garcia
Does it matter? it makes the public watch it & take notice of the problem. If I dumped a ton of reading information and or general documentaries about the subject on some faggot, I doubt they would care.
After I made a girl I know watch the bootleg documentary about Snowden, she started to care more about he issue, which is exactly what it's meant to do
I had a look. Both pastes are from 2017, many fields remain unwritten. I think you need to look a bit closer on that - a good FAQ is important to build a community in the general.
Landon Campbell
The last edit I did on the FAQ was on NOV 18th. Changed news and the HDD part. >Community Every time I've tried to improve the FAQ everybody got salty and sperged about me instead of helping so.
Nathan Morris
>Every time I've tried to improve the FAQ everybody got salty and sperged about me instead of helping so. Sorry to hear that. then again the /cyb/ FAQ also took years to reach the present state.
Why not take the /cyb/ FAQ, rip out the text and keep the framework, pour the pastes into it for easier reading? Then dedicate each general thread to one section?
There is a fair bit of info you can take from tldp.org which is old but still useful.
Jack Williams
just put in brackets that it's actually a biopic for the sake of accuracy if you're gonna keep it in the docu section
t. autist
Hunter Ramirez
Hackers, Wizards of the Electronic Age
Alexander Long
>Every time I've tried to improve the FAQ everybody got salty and sperged about me instead of helping so. Ignore trolls, those comments are not there to help your thread. Is like one of the rules of being an OP.
Oliver Watson
I know lol, but if 70% of the early posts are just salty trolls you can't make a thread of it.
Ethan Flores
I remember when /fglt/ started, it was a war.
Joseph Diaz
Once you get the ball rolling, even if using sock puppets, others will feel the FOMO and you are golden.
>fglt Which one is that?
John Howard
=== /cyb/ /sec/ News: The painneve ends. >Google admits error over hidden microphone bbc.com/news/technology-47303077 >Google has acknowledged that it made an error in not disclosing that one of its home alarm products contained a microphone.
>Product specifications for the Nest Guard, available since 2017, had made no mention of the listening device.
There are many reports of people seeing ads out of the blue on things they have discussed with others and not actively searched for. We are still waiting for an admission here.
Aaron Carter
>home alarm products contained a microphone >users didn't know
... and Google regrets the error. The error being that they were caught.
In cases like this I always wonder what we have yet to find out. Had you told this to people in 1984 they would just have laughed hysterically. Today it is only a minor headline.
Dominic Baker
who even needs a memory hole in 2019
Nathan Brown
>be 24, wasted last 5 years on mental fuckery and weed >zoomered myself out of my own passions and hobbies >option a) spend up to £70000 and 4+ years finishing off A levels and doing a comp networking degree >option b) get a driving license, buy a shitty car and deliver food until I can get a better one and drive a cab/uber, maybe begum self-employed electrician, learn everything /cyb/+/sec/ on my own via resources anybody Jow Forumsot any input?
Christian Collins
Option c) Kill yourself
Christopher Cox
of course by 'spend' I mean go in debt, Idk how viable student loans are for wastegash like me anyway
Jack Wilson
considered this many times but negative, had best friend kill himself 4 years ago, unfortunately I have people to whom I can't do the same
Luis Jackson
do you guys use keybase? how do you manage your keys?
Lucas Smith
I use lastpass. I know, I'll probably get some shit because it's proprietary, but it has had security audits and from my research (which might be outdated) some of the open source alternatives had proven flaws. And so far it works for me. I'm not married to lastpass though and would change if given a compelling reason.
Levi Murphy
Oh wow. I'm retarded. I read KEYPASS not KEYBASE. Ha, ha
Gabriel Wright
Pretty much what you said. Drafting and checking compliance of network devices with company's security configuration guidelines. Developing and implementing new security features senior infosec management wants to roll out on network devices (updated firewall rules, VPNs, DDoS protection like Cloudflare). Checking logs. Internal pentest is definitely a separate team though.
Adam Harris
If you've got the will, just save yourself 60k and get a networking cert. Cisco, AWS, I think juniper has one. This takes more initiative and indepdence than schooling because there's no outside pressure to motivate you, but it'll save you a few hundred thousand in real plus opportunity cost. Get something you can wave in front of an employer, don't care about advanced shit (it's normal to do it with the company, many will even sponsor you).
What job you do meanwhile doesn't matter. If you can, try to scope out some basic IT stuff.
Liam Jackson
Interesting, yet often forgotten about note in a blog: A Speaker is not so much different from a microphone and can be used as such.
>A Speaker is not so much different from a microphone and can be used as such. True. Nevertheless you need the electronics to support it. So in addition to the DAC to drive the loudspeaker you need an ADC to listen in with.
Google already makes several chips, perhaps they make something for this too.
Elijah Hill
Thanks man
Thomas Hughes
Making their own chips can also mean they do not trust normal suppliers.
Jaxon Howard
np
For more retro feel how about add Computer Chronicles in Tv shows
Austin Wilson
What do you anons use to check executable files apart from common sense (certificates, file size, etc.)? I'm using Windows Defender scan, but I'm sure that's not the best option.
yep. That and VirusTotal. I don't know if there's anything better out there that isn't just a business trying to scam old people.
Justin Smith
I would put those files on a Linux box and scan them with ClamAV.
Jose Ramirez
thanks user; I'll give that go
Easton Garcia
On occasions I have used the Unix command strings to extract printable strings from executables to see what is inside. Strings such as "Muahaha" and "ЯUSSIAИ" can be bad signs.
Hardware encryption or filesystem encryption for USB drive for storing my private keys?
Angel Jenkins
what's your thread model? Usually you're fine either way, even if hardware encryption is somewhat frequently in the news because their implementation are flawed
Julian Richardson
Aaaaaaaaaaand is dead
Daniel Barnes
>what's your thread model? Sorry for being autist, but what do you mean by thread model?
Jeremiah Kelly
you usually evaluate from whom you want to keep your stuff safe from, satan. common thugs are repelled by ROT13, agencies certainly are not
Asher Williams
Oh you meant threat model. What's something the military will have trouble cracking?
Kayden Thompson
whoops, didn't even realize that typo until now there'll always be ways around safety measures. If someone has physical access, it gets even harder to employ safety. But I guess if you mess with them, they won't jump those hoops - a rubber hose will get them what they want to know
Gabriel Green
You mean you didn't check the source for the /cyb/ FAQ?
A lot of people here are sceptical about the various chat systems since they are known to mine everything for use in targeted advertising. And that is pretty much as far from /cyb/ and /sec/ as you can get.
Joshua Hernandez
I wouldn't worry about them forcing anything out of me. As is standard, cyanide ready in mouth and house hooked with IoT explosives with an activator in my shoe. Fuck it I'll just get some hardware encrypted USB and put an encrypted filesystem on it. What could go wrong.
Kevin Martin
Option D exists if you are an American- enlist in the Army as a 17C (Cyber Operations Specialist) or navy as a CTN (Cryptologic Technician - Network) and be prepared to learn ~6 years of info in the 6 months following basic training.
Basic isn't hard. The school you will be going through if you go this route is. The military will pay you and pay for you to go through this class, which earns you 33 college credits, then, once you pass, will pay you and pay for you to go to school/take classes online, and earn your degree and/or certifications. You also get a TS/SCI clearance and when you get out of the military, you can land a 6 figure job with damn near anyone.
That is, if you want to get out. Roughly 80% of this school's graduates end up doing boring defense/forensics things. 20%, however, get to do and know things that are highly classified and very much illegal for anyone else.
Colton Phillips
But matrix is open source and decentralized, how is that not enough?
Jaxon Brown
You should stick to the changes you make instead of listening to the trolls. You could remake the whole FAQ and put the old one on Pastebin so people still have access to it. Updated info will definitely bring more anons one of these days. And I'll start bumping the thread fro now on dear user.
Asher Moore
Over at /co/ they are storytiming Wm. Gibson's Alien3 script:
Benjamin Perry
not that user, but if I were to do option D, do I get to watch anime while I'm not in class?
Angel Lewis
This is the right answer.
If the FAQ is split between the two pastes pastebin.com/XYYp9TAC pastebin.com/SXuHp12J I can prime a FAQ with this and format it, and also place it on the FTP site. There is a lot of more work to be done but I cannot do more than this since I am working on the /cyb/ FAQ still.
Windows Defender is some of the best software on the market, and it's stock on the box. If you're running Windows, there's literally no reason to pay for AV software.
that wasnt me, but anyways, why should i join YOUR meshnet instead of the 300 others?
Jose Thompson
Because the picture isn't my meshnet and I specifically mentioned joining a local group.
Levi Sanchez
>local group what makes you think one of those exists?
Mason Morgan
There should be one in your city, if not create one.
Brandon Ramirez
is MalwareBytes a meme or am I just a zoomer? >inb4 both
Dylan Richardson
Ok I'm going to ask here since I am not sure where else to ask.
So I did a network scan (ping method) on my network with my android phone. I noticed when I can the subnet for wired connections I dont see any devices, only when I scan specific ip address for the wired device (same method, pinging)
I haven't tried with my laptop, using debian or whatever, but what could possible cause this? Scanning too fast maybe?
Elijah Robinson
Once upon a time anti-malware and anti-spyware were two applications recommended to be installed together, not sure about now. MalwareBytes was the recommended anti-malware.
Cooper Nguyen
>Rollerball (2002)
What the FUCK is wrong with you user? its Rollerball (1975)
I alway check the hash of a file on virustotal. They have a uploader tool and I often upload any pdf/exe before I run that shit on my computer
Owen Bell
Revise Option A and go to an international university for a CS degree. Aim for one of those free universities in Germany, Belgium, or Italy for decent quality. Spend 4 years enjoying yourself abroad, banging hot European chicks while working part-time doing whatever you'd like to pay for food and an apartment. Better yet, get some room mates to enrich the experience.
Better yet, get some certs on the way to make yourself a better prospect when you hit the market. You'll have enough spare time to get a few good ones so aim for the best first. CCNA is a no-brainer.
Adam Hughes
Give me one reason why I should read this piece of shit.
Benjamin Cruz
So you finally got bullied enough to stop using discord? Excellent.
Not same user, but I always wanted to apply this settings, although I do not want to do it blind so I'm never doing it out of laziness. Check it out, maybe you will like it: >privacytools.io/#about_config