Sparkega

joined 1 year ago
[–] Sparkega@lemmy.world 4 points 7 months ago (1 children)

I’ll give you a piece of my mind.

Just kidding. Thanks for the correction

[–] Sparkega@lemmy.world 63 points 7 months ago (4 children)

Eliminates a malicious threat vector. Gives you piece of mind to charge your devices without worry that what you connect to is going to interact with your device.

[–] Sparkega@lemmy.world 1 points 11 months ago

Thanks for the recommendations! The only one I don't have already is Slime Rancher, which was 75% off!

[–] Sparkega@lemmy.world 5 points 11 months ago (8 children)

Any recommendations?

 

Researchers analyzed 190 million hacking events on a honeynet and categorized the types of hackers into Dungeons and Dragons classses.

Rangers evaluate the system and set conditions for a follow-on attack.

Thieves install cryptominers and other profiteering software.

Barbarians attempt to brute force their way into adjacent systems.

Wizards connect the newly compromised system to a previous to establish 'portals' to tunnel through to obscure their identity.

Bards have no apparent hacking skill and likely purchase or otherwise acquired access. They perform basic computer tasks.

[–] Sparkega@lemmy.world 2 points 1 year ago

It's a tool like any others. I think it's worth including in your kit for it's range of capabilities. This item is freely available and could be used by anyone. Including it in your assessment replicates the current threat environment.