borari

joined 6 months ago
[–] borari@lemmy.dbzer0.com 1 points 3 days ago

Do you have to pay per line you scroll on your phone/computer or something?

[–] borari@lemmy.dbzer0.com 2 points 1 week ago* (last edited 1 week ago)

Yeah, there’s some discord chat logs there that are supposed to make this Midokuri dude look shitty I guess? Idk. I really don’t know why I’m reading this shit at 3am lol.

Google translate page

Edit - idk why it’s saying undefined language in that link, just change the drop down to Japanese.

[–] borari@lemmy.dbzer0.com 3 points 1 week ago (1 children)

If they’re on their phone they should just make sure they don’t connect to their home WiFi or their campus WiFi on their phone during work hours. All anyone will see them connecting with then is their cell network IP, prolly just an ipv6 address, and there won’t ever be an obvious tell that they are in a specific location in town.

[–] borari@lemmy.dbzer0.com 2 points 1 week ago (1 children)

I’m a huge proponent of Yubikeys, and I use them every day. I use it for every account I have that supports non-resident FIDO2. I have my ssh keys set up on there so i can just sit down at any computer and ssh in to my remote servers without having to rely on being on a computer with its pub key already on the server. I use it for my pgp keys. I use it for TOTP on a few of my more sensitive accounts that don’t support anything better.

In addition to my regular w2 9-5 pen testing job I do pen testing as a contractor for a place like hacker one on steroids. I am forced to use Duo by them. Can’t use another TOTP app, can’t use a yubikey. While in most cases you can use another TOTP instead of duo, it is not always possible. That said, I highly doubt a school system has set up Duo in a way that prevents you from using alternate TOTP apps.

[–] borari@lemmy.dbzer0.com 13 points 1 week ago (1 children)

I thought that username felt familiar, so I clicked through to their profile. Yup, already blocked lol.

[–] borari@lemmy.dbzer0.com 12 points 1 week ago

The non credible defense bucket.

[–] borari@lemmy.dbzer0.com 0 points 1 week ago (1 children)

Ban caffeine in drinks? Like added caffeine? I’m assuming you can still get coffee but you can’t buy a Monster or a Red Bull or something? Is it over a certain limit, so sodas and stuff are ok or still no? Why not ban sugar in soda before caffeine in soda? I have so many questions.

[–] borari@lemmy.dbzer0.com 2 points 1 week ago

Idk, I know I definitely liked being in one of them outside the wire than in a humvee.

[–] borari@lemmy.dbzer0.com 16 points 1 week ago (2 children)

Just gotta get the last word in huh? You fucking blocked bro.

[–] borari@lemmy.dbzer0.com 17 points 1 week ago (15 children)

Other people have explained it to you, and the article is right fucking there for you to click on and read, which you’ve ostensibly already done. I’m not going to waste my time further with a person like you.

[–] borari@lemmy.dbzer0.com 54 points 1 week ago (25 children)

Bro that’s not even an accurate summary of the article. Do you have zero reading comprehension or do you just enjoy defending at best borderline pedos?

[–] borari@lemmy.dbzer0.com 3 points 1 week ago

I agree. If you don’t have to manually pump the wiper blades you can fuck right off with your shit GMC.

 

HOUSTON, Aug 21 (Reuters) - U.S. oilfield services firm Halliburton (HAL.N), opens new tab on Wednesday was hit by a cyberattack, according to a person familiar with the matter. Halliburton said it was aware of an issue affecting certain systems at the company and was working to determine the cause and impact of the problem. The company was also working with "leading external experts" to fix the issue, a spokesperson said in an emailed statement. The attack appeared to impact business operations at the company's north Houston campus, as well as some global connectivity networks, the person said, who declined to be identified because they were not authorized to speak on the record. The company has asked some staff not to connect to internal networks, the person said. Houston, Texas-based Halliburton is one of the largest oilfield services firms in the world, providing drilling services and equipment to major energy producers around the globe. It had nearly 48,000 employees and operated in more than 70 countries at the end of last year.

Cyberattacks have been a major headache for the energy industry. In 2021, hackers attacked the Colonial Pipeline with ransomware, causing a days-long shutdown to the major fuel supply line. That breach, which the FBI attributed to a gang called DarkSide, led to a spike in gasoline prices, panic buying and localized fuel shortages. Several major U.S. companies have suffered ransomware attacks in recent years, including UnitedHealth Group (UNH.N), opens new tab, gambling giants MGM Resorts International (MGM.N), opens new tab, Caesars Entertainment CZR.O and consumer good maker Clorox (CLX.N), opens new tab.

While its unclear what exactly is happening at Halliburton, ransom software works by encrypting victims' data. Typically, hackers will offer the victim a key in return for cryptocurrency payments that can run into the hundreds of thousands or even millions of dollars. If the victim resists, hackers sometimes threaten to leak confidential data in a bid to pile on the pressure. The ransomware group DarkSide, suspected by U.S. authorities of the Colonial Pipeline attack, for example, said it wanted to make money. Colonial Pipeline's CEO said his company paid a $4.4 million ransom as executives were unsure how badly its systems were breached or how long it would take to restore the pipeline.

view more: next ›