- 154
- 21 718 841
NixieDoesLinux
United States
Registrace 29. 09. 2010
Turn on that bell so you don't miss new video releases 💜
OS.ALT covers the indie/hacking/geek community, including open source alternatives to operating systems and gaming. I'll have Android hacks (rooting, comparison vs. iPhone, preview apps, workarounds & tinkering), Linux for newbs, plus audience questions & answers. Your source for open source.
NOTE: Use the "Contact Me" link on the header above
OS.ALT covers the indie/hacking/geek community, including open source alternatives to operating systems and gaming. I'll have Android hacks (rooting, comparison vs. iPhone, preview apps, workarounds & tinkering), Linux for newbs, plus audience questions & answers. Your source for open source.
NOTE: Use the "Contact Me" link on the header above
Russia H4CKING 😨 Targeting US? Phishing & Credential Stuffing! 🔒 #CyberAttacks Part 2/2
Let's dig in deeper to understand the threat of this scale of cyber crime. Part 2/2 - My full post: geekbeacon.org/announcements/preview-ru-hacking-cyber-attacks-pt-2-how-theyre-doing-it-why-should-we-care/ " In cyberspace, a volunteer Ukrainian cyber army, hacktivists and cybercriminals are battling for impact in an increasingly chaotic information war." #cyberattack #cybersecurity
Video Chapter Guide:
0:00 - Intro, About Me
0:41 - Phishing and Spearphishing
1:58 - Spearphishing
4:55 - Physical Access
5:43 - Credential Stuffing and Bruteforcing
7:18 - How to Use Privacy Best Practices
11:58 - How Russian and Ukraine are Handling Things - The IT Army!
15:04 - Use a VPN!
I love the newest Data Broker episode from John Oliver! He discusses how much data brokers know about us, what they’re doing with our personal information, and one….unusual way to change privacy laws.
Transcript excerpt: What we've learned is that a series of cleared defense contractors, or CDCs, have been extensively infiltrated with lurker accounts. A CDC is a private entity that has been given clearance by the Department of Defense to access, receive, or store classified information. So the contractors that work with our nation's military, who have access to some of the most current and most sensitive information available, have been subject to credential stuffing as well as spear-phishing campaigns. Credential stuffing is something I've explored before, but it was long enough ago that I'm gonna go over it again real quick. You know those widely publicized data breaches from megacorps like Facebook or LinkedIn? If compromised, all your tenda data nuggets such as account access information like username and password combos are traded or sold from huge lists. An attacker takes this access data and applies it to other services in massive batches in the hopes that some users will have used the same credentials. So if you're reusing username and password combinations, or even just passwords, you're a viable target to this kind of tactic. Even though credential stuffing has a surprisingly low rate of success, because attackers can automate the process with bots they can launch more attacks more quickly the overall volume can make it worth it. Even if the profitable data the attackers acquire isn't something immediate like credit card or banking information, other sensitive information can be used later in more effective phishing attacks. As an end-user, one of the best and most effective things you can do to protect yourself from credential stuffing attacks is to always avoid password reuse! It seems obvious, but you'd be surprised how many people slip into the habit. In addition to using a unique, strong password with each service, enabling two-factor authentication when available provides an extra layer of security. I even have an awesome video on password reuse and why you shouldn’t do it.. But anyway…
Over the course of two years, hackers have been successfully targeting CDCs that handle contracts for the US Department of Defense and intelligence community. These lurkers have maintained access to networks, often for months, gathering and exfiltrating huge quantities of data. I'm talking about emails between employees, between the companies and other companies, documents relating to the company's products and research. CDCs that have information relating to the most current technological and scientific workings of the United States Department of Defense and so, so much of it has been harvested. Everything from proprietary details to specific technologies, infrastructure plans, even development and deployment timelines for US weapons-platforms. The Cybersecurity and Infrastructure Security Agency, (CISA), released a joint cybersecurity advisory with the FBI and NSA, imploring private sector partners and the public to "implement good cyber hygiene".
Video Chapter Guide:
0:00 - Intro, About Me
0:41 - Phishing and Spearphishing
1:58 - Spearphishing
4:55 - Physical Access
5:43 - Credential Stuffing and Bruteforcing
7:18 - How to Use Privacy Best Practices
11:58 - How Russian and Ukraine are Handling Things - The IT Army!
15:04 - Use a VPN!
I love the newest Data Broker episode from John Oliver! He discusses how much data brokers know about us, what they’re doing with our personal information, and one….unusual way to change privacy laws.
Transcript excerpt: What we've learned is that a series of cleared defense contractors, or CDCs, have been extensively infiltrated with lurker accounts. A CDC is a private entity that has been given clearance by the Department of Defense to access, receive, or store classified information. So the contractors that work with our nation's military, who have access to some of the most current and most sensitive information available, have been subject to credential stuffing as well as spear-phishing campaigns. Credential stuffing is something I've explored before, but it was long enough ago that I'm gonna go over it again real quick. You know those widely publicized data breaches from megacorps like Facebook or LinkedIn? If compromised, all your tenda data nuggets such as account access information like username and password combos are traded or sold from huge lists. An attacker takes this access data and applies it to other services in massive batches in the hopes that some users will have used the same credentials. So if you're reusing username and password combinations, or even just passwords, you're a viable target to this kind of tactic. Even though credential stuffing has a surprisingly low rate of success, because attackers can automate the process with bots they can launch more attacks more quickly the overall volume can make it worth it. Even if the profitable data the attackers acquire isn't something immediate like credit card or banking information, other sensitive information can be used later in more effective phishing attacks. As an end-user, one of the best and most effective things you can do to protect yourself from credential stuffing attacks is to always avoid password reuse! It seems obvious, but you'd be surprised how many people slip into the habit. In addition to using a unique, strong password with each service, enabling two-factor authentication when available provides an extra layer of security. I even have an awesome video on password reuse and why you shouldn’t do it.. But anyway…
Over the course of two years, hackers have been successfully targeting CDCs that handle contracts for the US Department of Defense and intelligence community. These lurkers have maintained access to networks, often for months, gathering and exfiltrating huge quantities of data. I'm talking about emails between employees, between the companies and other companies, documents relating to the company's products and research. CDCs that have information relating to the most current technological and scientific workings of the United States Department of Defense and so, so much of it has been harvested. Everything from proprietary details to specific technologies, infrastructure plans, even development and deployment timelines for US weapons-platforms. The Cybersecurity and Infrastructure Security Agency, (CISA), released a joint cybersecurity advisory with the FBI and NSA, imploring private sector partners and the public to "implement good cyber hygiene".
zhlédnutí: 9 177
Video
WTF Russian Cyberattacks - 3 Types of #CyberSecurity Threats - Properly Paranoid #ethicalhacking
zhlédnutí 8KPřed 2 lety
Part 1 of 2, Let's chat about what cyber att4ck5 we're seeing from Russia are and if we should worry. Part II: czcams.com/video/atn5Yt-VZb4/video.html Remember when the Java™ log4j vuln gave hackers access to devices and networks? One of the biggest concerns is how many systems and networks could have lurkers ready to trigger anything from data exfiltration to catastrophic attacks. This is kind...
Sneak Peek into an #OpenSource Convention - THANK YOU for GBF2022! Highlights
zhlédnutí 1,9KPřed 2 lety
Sneak Peek into an #OpenSource Convention - THANK YOU for GBF2022! Highlights
Properly Paranoid - Log4J Vuln - Bigger Creepers than Minecraft #cybersecurity #privacy
zhlédnutí 6KPřed 2 lety
Properly Paranoid - Log4J Vuln - Bigger Creepers than Minecraft #cybersecurity #privacy
Join our Free Epic Open Source Geek Culture Conference #opensource #foss 2/18 - 2/19 2022
zhlédnutí 4,3KPřed 2 lety
Join our Free Epic Open Source Geek Culture Conference #opensource #foss 2/18 - 2/19 2022
Free Programming / Coding Mechanical Keyboards (NOT Sponsored) Giveaway with @daskeyboard #shorts
zhlédnutí 9KPřed 3 lety
Free Programming / Coding Mechanical Keyboards (NOT Sponsored) Giveaway with @daskeyboard #shorts
Cyber Security & User Privacy in 2022 - Surveillance Debate, Our 1st Time Hacking, FOSS Tools Debate
zhlédnutí 23KPřed 3 lety
Cyber Security & User Privacy in 2022 - Surveillance Debate, Our 1st Time Hacking, FOSS Tools Debate
Making up for Lost Linux Time - Something You'd Never Expect
zhlédnutí 18KPřed 3 lety
Making up for Lost Linux Time - Something You'd Never Expect
Surprise! A Wild Nixie Pixel Appears - Storytime
zhlédnutí 48KPřed 5 lety
Surprise! A Wild Nixie Pixel Appears - Storytime
SSH - Advanced Terminal Tricks : Part 1
zhlédnutí 103KPřed 5 lety
SSH - Advanced Terminal Tricks : Part 1
Firewatch Game - First Look Gameplay & Review
zhlédnutí 59KPřed 8 lety
Firewatch Game - First Look Gameplay & Review
4 Free Browser Tools for Privacy on the Net - Properly Paranoid
zhlédnutí 204KPřed 8 lety
4 Free Browser Tools for Privacy on the Net - Properly Paranoid
Uncovering the Secrets of Tacoma - Game Preview
zhlédnutí 84KPřed 9 lety
Uncovering the Secrets of Tacoma - Game Preview
Is this real life? My (Slightly Medicated) Update
zhlédnutí 53KPřed 9 lety
Is this real life? My (Slightly Medicated) Update
My Linux Gaming Story - with Bonus Rants!
zhlédnutí 119KPřed 9 lety
My Linux Gaming Story - with Bonus Rants!
3D Printing with Light - Future of Open Source is Bright
zhlédnutí 41KPřed 9 lety
3D Printing with Light - Future of Open Source is Bright
Open Source 3D Printing Will Change the World
zhlédnutí 37KPřed 9 lety
Open Source 3D Printing Will Change the World
7 Jedi Mind Tricks to Focus & Get What You Want
zhlédnutí 53KPřed 9 lety
7 Jedi Mind Tricks to Focus & Get What You Want
Privacy and Giveaways! Live Show - August
zhlédnutí 37KPřed 9 lety
Privacy and Giveaways! Live Show - August
I use Self-Unalive Linux btw (it resolves all “command not found” errors to “sudo rm -rf /*” (the “brick computer” command)
What other Linux distributions also use GRUB2 and can be fixed with this this method? Thanks
I miss you. Please keep talking nerdy to me.
Where you been?
Muchísimas gracias, me ayudaste a salvar mi instalación Debian que no iniciaba después de intentar instalar un driver, GRACIAS!
And then Discord entered the chat...
i use windows 11 23h2 btw
TempleOS or go home.
no 0ad?
I just installed the Debian Dark Matter Theme that dual boot between Ubuntu and Kali. It works just fine except for a blank black box that pops up once the OS is selected. It takes a few seconds, then loads my OS all good from there. Anybobe got any ideas what this is about???
I use ... Btw
where have u been xD
I would 100x rather have a neckbeard than that dog leash you're using.
damn ur like the original discord kitten...
Love this video and the monster nearby! Late in coming to the show. 12 years later and think MS is a monopoly so happy to find out about LO and OO! Thanks!
i remember you way back in the day nixie pixel the chick that always talk about ubuntu lol :) good to see ur videos again puts happy tears to me eyes...
FPGAs
Been using it for many years but ...Time to vent. A couple things...First is there ANY way to ONLY allow email from .org, .com, and .net. Filtering is useless since scammers have millions of iterations of their email address. Second, for the life of me, I have yet to figure out the search routine which SHOULD be cut and dry. Yet, when I search for an email by a word in the subject line, even as I am seeing that email in the deleted list, the search cannot find that email. Maybe I'm doing something wrong. Ex. I ordered a Tripp-Lite cable. I go to the deleted list. I can SEE the deleted email in the list. Type in Tripp-Lite in the search bar. And yet the search does not find it :(.
24y What happened to nixie pixel?
24y What happened to nixie pixel?
Top Norks!
you’re a genius
I saw that there were 665 comments so I had to be number 666 \m/ Cue Sweet Leaf by Sabbath.
I came while watching the intro.
🐧
I want that Tux
I am really trying to learn this stuff and I appreciate your video however I'm a audio learner Sea-Doo I don't type sudo
RIP NIXIE😢
What happened? The last I heard from her, she was doing side quests.
i don't see an EFI in your video ?
beatfull
beatifull
Hope u made ur money cuz u hit the wall. It's so over
It is now 2024. Have you a update?
I use windows btw 🗿
More videos please. We need smart women in the linux space.
im 22 classic mann ha i study IT i want you as my wifi would you be my wifi ? if you give me your password ;) wana make LAN family
your channel have no new videos along 1 year. So did you stop working on this Channel
This video really bring back nostalgia.
I’d like to slide in…then back out…then slide in again. Wash. Rinse. Squirt. Repeat.
Much appreciation for the brevity & clarity! I watched a bunch of other videos that were not of much help. This one worked for me. The only thing that I had to do differently is mount my EFI partition to /mnt/boot/efi before I could successfully re-install grub.
Hy Adam, I'll try that for now.
Chatgpt why did you give me this video.
Wow I remember this video back when it was uploaded. Man I'm old :(
Титьки норм
I honestly can't figure out what this video is about. Every time I try the words just disappear.
Couldn't believe a 12 year old video helped me tho ..great
I use mint btw
now it makes sense ... i use debian and my beard is long and i'm thinking of going to arch
The worst part of your videos is that I'll never get to chat with you.
Aint no way
@@NemanjaVEVO how can that be?!?!?
@@NemanjaVEVO gotta try