Interview with Computer Security Trainer

Sdílet
Vložit
  • čas přidán 21. 08. 2024

Komentáře • 440

  • @mariotabali2603
    @mariotabali2603 Před rokem +818

    A friend works in a company where they send dummy fraudulent mails so those who bite are sent to classes.

    • @Heavenira
      @Heavenira Před rokem +24

      yup, that's the worst ever

    • @BrentBrewington
      @BrentBrewington Před rokem +89

      Why is that bad?

    • @fettjango1947
      @fettjango1947 Před rokem +32

      they do this shit in my company too

    • @BrentBrewington
      @BrentBrewington Před rokem +110

      Also, how else do you recommend helping the human operators of the email accounts on their guard? People tend to trust by default, and you have to help them become skeptical of what comes in

    • @MagicD3VIL2
      @MagicD3VIL2 Před rokem +3

      Hoxhunt?

  • @Senpapaya
    @Senpapaya Před rokem +256

    Literally more informative than my job's cybersecurity training

    • @eIicit
      @eIicit Před 3 dny

      Let me come train your company

  • @Cloakdasasin0
    @Cloakdasasin0 Před rokem +621

    He's so entertaining he actually made me stop staring at the Netscape icon to look at him for part of the video.

    • @BillClinton228
      @BillClinton228 Před rokem

      When I see two laptops I see an amateur... he has to have at least 6 laptops on that desk for me to take him seriously.

    • @Tweaker420666
      @Tweaker420666 Před rokem +6

      you livin in 2050. im using ibrowse 2.5 on amiga os 3.1

  • @patrickkranzpiller6400
    @patrickkranzpiller6400 Před rokem +879

    I run arch linux, that means I'm beyond human 😂

    • @user-cx6ec2kp6u
      @user-cx6ec2kp6u Před rokem +18

      When he said it, I cried tears of joy

    • @e-jarod4110
      @e-jarod4110 Před rokem +22

      I use arch, btw

    • @retsim_x
      @retsim_x Před rokem +9

      arch btw

    • @lgroschiensalle
      @lgroschiensalle Před rokem +56

      @@e-jarod4110 Using ‘btw’ is now considered insecure since it was compromised in 2021. You should update to ‘btw v2.0’

    • @mukundiyer5290
      @mukundiyer5290 Před rokem

      Is Manjaro an option?

  • @davidbakin1953
    @davidbakin1953 Před rokem +121

    "How did that affect the power supply?" - "I might have had access..."

  • @bullpup1337
    @bullpup1337 Před měsícem +12

    this aged well…. „dont outsource all your security work to a third party!“ if only we had listened

  • @nobodyspecial1553
    @nobodyspecial1553 Před rokem +316

    3:20 Flips the USB two times. Relatable as always.
    Edit: 5:09

    • @psymoozoo
      @psymoozoo Před rokem +39

      USB has half integer spin

    • @asnifuashifj91274
      @asnifuashifj91274 Před rokem +15

      usb-a, which is another name for a quantum state device is always in two states so you never know how many times you need to flip it, until you find a good method to observe the time it takes for it to flip long enough to understand whether it is wrong or right

    • @krisztiankoblos1948
      @krisztiankoblos1948 Před 6 měsíci +1

      ​@@psymoozoo 1/2? I stole it.

  • @LordBeef
    @LordBeef Před rokem +201

    The part where he puts in the USB the wrong way, then flips it over and it’s still the wrong way, and then he flips it over again and it’s…somehow the right way now? Happens all the time 😂

    • @SirGarthur
      @SirGarthur Před rokem +2

      😭

    • @hasan8084
      @hasan8084 Před rokem +4

      Happens to me every single damn time.

    • @lawrencedoliveiro9104
      @lawrencedoliveiro9104 Před rokem +18

      In physics, the electron has a wave function that has to be rotated through 720° to bring it back to its original orientation. #Relatable

    • @terraneaux
      @terraneaux Před 10 měsíci +5

      @@lawrencedoliveiro9104 Yup, USB drives have a spin greater than 1.

  • @NikConwell
    @NikConwell Před rokem +60

    That part about going to a website and getting distracted by the site is so true!

  • @jakecullimore1172
    @jakecullimore1172 Před rokem +62

    I need to get one of those password managers too, he seemed like a nice guy

  • @thedeadbaby
    @thedeadbaby Před rokem +141

    I love corporate compliance training programs that preach about security (only social engineering attacks) and then the company has multiple other vulnerabilities like storing plain text passwords, bobby tables, unsanitized html storage etc etc etc that would open them up to being shut down by any malicious individual who doesn't need to communicate with anyone in the organization whatsoever.

    • @TheWaffleRadio
      @TheWaffleRadio Před rokem +9

      I think they do that in trainings because well, what are Jerry the HR Specialist or Alisha the NE Regional Sales Manager going to about locking up unsanitized html storage, or interact with the storage architecture directly at all? And those are the "everyone does this" trainings. Specialists need more knowledge but for most users, they need to not plug in random USB sticks they find under the couch

    • @epajarjestys9981
      @epajarjestys9981 Před rokem +3

      "bobby tables"?
      I only know this from the XKCD comic where it is a nick name for the son with the strange SQL injection in his name. Is there actually something else called "bobby tables"? When I google all I find is references to the XKCD comic. Also no mention of any other meaning of "bobby tables" on explainxkcd.

    • @thefacethatstares
      @thefacethatstares Před rokem +4

      @@epajarjestys9981 that's the intended meaning, any software dev will know immediately what "bobby tables" is referring to

    • @omarjimenezromero3463
      @omarjimenezromero3463 Před měsícem

      unsatinized html and unsatinized javascript forms are my daily dose of cybersecurity awareness.

    • @peterisawesomeplease
      @peterisawesomeplease Před 4 dny

      Those type of vulnerabilities are becoming more rare with time in comparison to social engineering attacks. And as others have mentioned isn't something its useful for random employees to know about.
      Thankfully sane defaults on popular frameworks and systems are slowly removing traditional security vulnerabilities. The price of exploits has skyrocketed with time.

  • @CalebHawn
    @CalebHawn Před rokem +61

    3:20 I love how it appropriately takes 3 tries to plug in the USB.

    • @sudocheese
      @sudocheese Před rokem +7

      I once heard that USB connectors are four dimensional, so rotating them 360 degrees actually presents the correct face to the jack.

  • @aleksandarm4489
    @aleksandarm4489 Před rokem +26

    "Don't outsource all your security work to fivrr !" 😂👍

  • @Laborejo
    @Laborejo Před rokem +308

    I don't even know if this is legit advice dressed as parody or the other way around.

    • @PorthorianTv
      @PorthorianTv Před rokem +45

      Some true some satire :)

    • @casperes0912
      @casperes0912 Před rokem +21

      Both!

    • @ped7g
      @ped7g Před rokem +57

      it's all legit advice. It's just the technology world become a parody.

    • @GSBarlev
      @GSBarlev Před rokem +19

      I'm pretty sure that Big Mac hack no longer works...

    • @derda1304
      @derda1304 Před rokem +6

      @@GSBarlev with many products its cheaper to buy the single items than the bundle.
      everyone thinks bundles are cheaper, so the companies profit from it

  • @gregt0m
    @gregt0m Před rokem +141

    I love this as being n the tech industry and hearing how “security” experts don’t always live by what they tell everyone else to do.

    • @danial5387
      @danial5387 Před rokem +18

      It’s impossible to. I’ve worked in cybersecurity for 10 years and still got tricked by a very well crafted phishing test lmao. Thankfully real phishing emails are always pathetic.

    • @lanelesic
      @lanelesic Před rokem +9

      As a cyber security architect and guru I must say its easier to earn millions scamming people than living that life.

    • @richmelchr
      @richmelchr Před rokem

      like a fat doctor

    • @eli_chaps
      @eli_chaps Před 11 měsíci +2

      Most of us are under the accidental stupidity category.

    • @eli_chaps
      @eli_chaps Před 11 měsíci

      @@lanelesic 💯

  • @ChristianStout
    @ChristianStout Před rokem +73

    "recorded on proprietary codecs"
    So this wasn't cut entirely in FFmpeg then?

    • @chrisrib05
      @chrisrib05 Před rokem +11

      "written on non-free software" not made on libre/openoffice

  • @ionut9672
    @ionut9672 Před rokem +45

    i'll send this to our interns as a legit good security training video

  • @Thomasfrank
    @Thomasfrank Před rokem +263

    Script involuntarily by Kevin Mitnick 😂

    • @Slm3lkm
      @Slm3lkm Před rokem +5

      😂😂😂 I can recall the resemblance now

    • @initor995
      @initor995 Před rokem

      😂

    • @StEvUgnIn
      @StEvUgnIn Před rokem

      This guy 😅

    • @Shadowdncer
      @Shadowdncer Před rokem +1

      Somehow this video is better than a course from a Mitnick-owned company.

    • @clawsoon
      @clawsoon Před rokem +10

      We just had to take a Kevin Mitnick security course at our company, lol. At first I assumed that the email telling us to take it was a scam...

  • @t117m
    @t117m Před rokem +17

    waltuh... put your usb drive away, waltuh... im not going to have security training with you right now, waltuh...

  • @vaulttectradingco8438
    @vaulttectradingco8438 Před rokem +126

    This unironically can be avery good training video. Most people don't pay attention to security training. Also, my showing how easy it is to hack makes people more paranoid about secuity to a more degree.

    • @BusinessWolf1
      @BusinessWolf1 Před rokem +7

      I think the most effective way to scare them of emails is to teach them just enough html and css to understand that's how emails are made pretty, then show them the script tag.

  • @klaesregis7487
    @klaesregis7487 Před rokem +23

    Loved the USB quantum state!

  • @Fighter05
    @Fighter05 Před rokem +209

    To be fair this was pretty much what my training class was like 15 years go. In my 30s now but back when there "Computer Science" included everything under the sun one of the security talks I had to take to get a student job in the university IT department, was basically this. "Trust Windows Defender because Microsoft is super wealthy and so therefore Defender bolsters the security image of their OS and will be the best tool to use."
    Back in the day when you would put "Computer Skills - Excel and Microsoft Outlook" on your resume and instantly get the job and the boss would ask you why his computer was running slow.

    • @GSBarlev
      @GSBarlev Před rokem +24

      Jen, is that you? If so, great job breaking the internet...

    • @sethsends
      @sethsends Před rokem +24

      Everything's come full circle because defender edr is one of the better options at this point

    • @andreilikayutub3496
      @andreilikayutub3496 Před rokem +7

      Oh gosh should I take excel off my resume?

    • @cryonim
      @cryonim Před rokem +3

      @@andreilikayutub3496 excel is powerful yea and data analysts/scientists and finance depts love their devs (and pay good $).
      But honestly, ms ecosystem is pure corporate life.

    • @atheopagan
      @atheopagan Před rokem +4

      15 years ago? You mean Windows Defender is not still an entirely new meme? I'm going to need to lay down and process this for a bit.

  • @Muhammad.Ali09272
    @Muhammad.Ali09272 Před měsícem +4

    Who came here after crowdstrike failure 😂

  • @zouweninthesky3445
    @zouweninthesky3445 Před rokem +8

    I was waiting for some kind of ad throughout all the video. What a legend, no profit high quality content machine

  • @fleity
    @fleity Před rokem +65

    This might just be the best security training I've ever seen. Sending it to my mother immediately xP

  • @Jadinandrews
    @Jadinandrews Před rokem +87

    Please do a video on the ceo that tries too hard to sounds tech savvy in a dev meeting

  • @NastyWicked
    @NastyWicked Před rokem +16

    Wasn't expecting the Arch flex that soon into the training.
    I use Arch btw.

    • @astrayadventurer4450
      @astrayadventurer4450 Před rokem +2

      You should always expect it. Arch users are like vegans or tesla owners. You'll know within 5 mins.

  • @snwtime
    @snwtime Před rokem +33

    Please do an interview with a database engineer!

  • @gandalfgrey91
    @gandalfgrey91 Před rokem +9

    “Just grab the session from someone” 😂😂😂

  • @allesarfint
    @allesarfint Před rokem +13

    Thank you so much for this training, now I can go and click links without worrying about getting hacked.

  • @MasterSergius
    @MasterSergius Před rokem +6

    Everybody: laughs
    Me: painful flashbacks

  • @Nullmoose
    @Nullmoose Před rokem +8

    The best one yet. Please don’t ever stop doing what you’re doing ser

  • @soryuushi
    @soryuushi Před rokem +12

    This is legitimately really good.

  • @keoagilempolokeng1310
    @keoagilempolokeng1310 Před rokem +11

    Big fan from South Africa!!
    I love this channel.

  • @DixonButts-69
    @DixonButts-69 Před 6 měsíci +2

    This is the best Cybersecurity training I have ever been a part of.

  • @NFSHeld
    @NFSHeld Před rokem +19

    Been an admin for a small startup (well, I AM not an admin, but I did the administration as good as I can; y'know, start-ups, can't afford a professional for each task).
    Anyway we/I established a "no connection of external to internal devices" rule, so no connection of smartphone, USB stick, hardware etc. to your laptop.
    CEO after plugging in his iPhone: "Well it's an iPhone, that doesn't apply for my iPhone, right? We don't need to make strict rules, need to make practical rules."
    My reply was "Okay, then the practical rule will be 'no restrictions whatsoever, because if even the CEO who has access to all the important business accounts refuses to do it right, what's the point in us 'normal' users with limited internal document access trying to secure anything?"

    • @watsonwrote
      @watsonwrote Před rokem +2

      The rules you set in the beginning really matter. The company I work for has grown out of being a flexible little startup into a big company with many moving parts. When I joined the IT team was still having growing pains because users were used to lax rules and a lot of freedom, and trying to set and enforce best practices was causing issues for our users. In particular, I do a lot of software review to determine what can be installed on user machines and I've had to review and approve quite a few things that have no business being on a work computer because, in the past, users were allowed to use their work computers like personal machines and many of those programs were grandfathered in. Now the expectation is "if so-and-so is allowed, why can't I also install this?"
      Some people still don't have their own personal computers (despite being paid absolutely well enough to afford them) and get upset when we don't allow them to install everything they want on them. (Also we have full access to everything happening on these machines and wish these people would stop putting personal files on these devices. Don't let people do that!!)
      I've been pushing back much harder on users to justify what programs should be reviewed and approved, and my team has been coming around. But if we just had a clear expectation in the first place nobody would be wasting three people's time time trying to get Goose Game Desktop, Steam Live Wallpapers, and MyRewards Shopping Extensions installed on their company's business computers.
      (The people who's time is wasted include the user, me, and one of the lawyers who has to review the licensing and the privacy policy. I stop the egregious ones before they get to our poor lawyers but some unnecessary things still technically qualify for review sometimes :/ )
      Anyway, wish your business the best of luck and hope you find the right balance of practicality and saving yourself future headaches

    • @Puschit1
      @Puschit1 Před rokem +2

      Well, in many occasions those strict rules hamper you greatly, causing you to work very inefficiently. For example copy&paste is forbidden between remote desktop sessions. This means I have to manually transfer serial numbers, telephone numbers and the like from customer system or our system and vice versa. The amount of time I waste is incredible, it's error-ridden and totally nerve-wrecking. On top of that it makes no sense whatsoever. If I wanted to steal data I could still send everything via email, messengers or whatever. Okay, at least that leaves traces - but I could also do screenshots without traces. It's just infuriating.
      Same applies to the stupid password rules. Meanwhile many studies prove what users always new: Mile long cryptic passwords make things LESS secure because no normal human can remember them, especially when you also have to change it every odd month and when you have to manage a dozen or so. And every solution to this (using the same password for everything, writing it down, using generic passwords that cheat the requirements etc) is worse than having a sane password. Of course it should not be "123456" or as simple as your child's name. But forcing everyone to use a minimum of 12 characters including lower and upper cases, numbers and special characters without being similar to the previous password is just too much. OF COURSE people will use the current year as the number, add a "!" to the end and use uppper case at the beginning etc.

    • @robertsneddon731
      @robertsneddon731 Před měsícem +2

      @@Puschit1 I saw the password for my contracted-in boss at a bank office by accident. It ended in "22". The Group Policy enforced a password change every two weeks. I asked him, "You've been working here for about nine months, right?" "Yeah, how did you know?"

  • @Athakaspen
    @Athakaspen Před rokem +18

    Great content as always, I can't wait to see an interview with a Qubes OS user now lol

    • @tedkofficial4244
      @tedkofficial4244 Před rokem +7

      So you update the... [cut] TemplateVM [cut] AppVM [cut] StandaloneVM [cut] dom0 VM [cut] HVM [cut] PVH [cut] ... [cut] and it's with tor, so it takes six hours... [cut] You don't need a graphics card [cut] It's not like you could use it anyway...

  • @artzoc
    @artzoc Před rokem +92

    Wonderful! This knowledge and the training overall has taught me so much about security that I finally feel safe. TY
    Also the reasoning why updating your software asap is better (for hackers ofc) is awesome
    and truly, I think, has to be backed by experience! luv

  • @lgroschiensalle
    @lgroschiensalle Před rokem +45

    TIP: If you're at McDonald's (orderin' a Big Mac + large fries/no-menu of course), the "Don't ever plug anything into your computer rule" doesn't apply. The reason is that, everything runs on computers over there now, even the cashier is a computer, and there's a lot o' computers at McDonald's, but.... These computers don't belong to you! So you may plug in anything, and I mean anything, you want into whatever slot/hole/port/socket whatsoever, to your hearts content! Be creative, but watch out for sparks, cuz those milk-shake machines have lots of tempting little slots to plug things into, but if you're a newbie plug-inner, they'll belch out 220 volts if yer' not careful....
    Example: Plug in a paperclip into the "reset" hole of the McDonald's Public-WiFi Access Point (if you can find it...) and hold it there fer' a good 20 Mississippis. That sucker should re-boot right up, except now it is yours! Only downside is that Now the "Don't plug in rule" DOES apply, because it is now "your computer"... ughhh

  • @OG_McLovin
    @OG_McLovin Před 11 měsíci +2

    This is the best Harley-Davidson ad I have ever seen. I should buy a bike.

  • @IanSebryk
    @IanSebryk Před rokem +8

    this has got to be the funniest thing i've seen in a very long time. more so, because it is absolutely spot-on! keep going, we love your work!

  • @nO_d3N1AL
    @nO_d3N1AL Před rokem +3

    For anyone wondering, the song is "Fresh" by Kawai Sprite

  • @coderider3022
    @coderider3022 Před rokem +7

    I was forced to doing a week long course like this and he got it perfect.

  • @natetronn
    @natetronn Před rokem +4

    What is most impressive is being hacked while watching the video. Didn't even see that one coming.

  • @MethodMain
    @MethodMain Před rokem +3

    Hey, it's our PERL programmer Walter Wallis!

  • @Finkelfunk
    @Finkelfunk Před rokem +5

    I was shattered when I wasn't able to visit the Harley Davidsone website

  • @dariogeorge8680
    @dariogeorge8680 Před rokem +6

    Perl Poet is back, baby!

  • @NoahSpurrier
    @NoahSpurrier Před rokem +3

    There is no wrong information here.

  • @johnbruhling8018
    @johnbruhling8018 Před rokem +4

    'Update to the newest version' while I stare at a giant Catalina desktop! And yeah I only dabble in Arch, I'm not crazy!

  • @LettersAndNumbers300
    @LettersAndNumbers300 Před rokem +3

    Amazing music choice

  • @nullvoid3545
    @nullvoid3545 Před rokem +7

    love the FnF music.

  • @DoorThief
    @DoorThief Před rokem +4

    Gettin' freaky on a Friday night!

  • @keith3761
    @keith3761 Před rokem +3

    He forgot the one where a Spec ops team blows the door off your building, seizes you and all your hard drives and makes you unlock them :P

  • @tylermiller759
    @tylermiller759 Před rokem +4

    This made my day. Thank You

  • @jamestiotio
    @jamestiotio Před rokem +3

    Annual corporate cybersecurity training should just show this video from now on.

  • @Gabbyreel
    @Gabbyreel Před rokem +5

    Yes yes very funny but isn't this actually a very accurate and correctly informative video too!?? Very nice work

  • @jbrandona119
    @jbrandona119 Před rokem +4

    Oh for phishing it can just be “Hello, Im your CEO. Buy please 2.000$ (thousand) in Apple Giftcards and email them backwards. Many blessings.” no need for any emotional manipulation 😂

    • @chrisrib05
      @chrisrib05 Před rokem +1

      This is emotional manipulation: you're scared of losing your job

  • @amir78989
    @amir78989 Před rokem +6

    more of this please! this was so good!

  • @jacobmccollum1206
    @jacobmccollum1206 Před rokem +1

    That transition music is absolutely incredible hahaha.

  • @LuCiPh33R1
    @LuCiPh33R1 Před rokem +3

    Netscape Navigator deep cut

  • @willthepotato
    @willthepotato Před rokem +1

    I love the attention to detail in setting up all of Walter's accounts!

  • @sanityd1
    @sanityd1 Před rokem +4

    You missed the bit where the company you do security for gets hacked and you get fired and immediately rehired somewhere else because no one in the industry thinks it's avoidable.

  • @mukundiyer5290
    @mukundiyer5290 Před rokem +3

    This should be in the yearly system security meeting in every company.

  • @patrickalmeida168
    @patrickalmeida168 Před rokem +7

    Make a DevOps/SRE one

  • @watsonwrote
    @watsonwrote Před rokem +31

    Once has a dev demand that we turn off the auto-link verification in Teams because "developers are smart and won't fall for phishing links"
    My team unanimously agreed that this was proof we needed to keep the link verification on lol

  • @rykehuss3435
    @rykehuss3435 Před rokem +3

    As a pen tester I was waiting for this

  • @micyclej
    @micyclej Před rokem +1

    The fnf music really makes this

  • @avithedev
    @avithedev Před rokem +4

    Putting the USB in three times 🤣🙌🏾

  • @jang2513
    @jang2513 Před rokem +1

    "young hansome 60 year old"

  • @Amurpo
    @Amurpo Před rokem +5

    best beards on youtube

  • @Abrifq
    @Abrifq Před rokem +2

    8:28
    "Waiting for as*" pops up
    _smacks lip_ "Beautiful"
    nice

  • @Ahmera
    @Ahmera Před rokem +2

    6:10 more relevant than ever haha

  • @sesa4141
    @sesa4141 Před rokem +2

    “Is this encryption”

  • @floopybits8037
    @floopybits8037 Před rokem +3

    Lesson 3c: concentrate during your Trojan demo 😂😂😂

  • @aafjeyakubu5124
    @aafjeyakubu5124 Před rokem +2

    I wish my company's security training was like this. So much better!

  • @naxcyber1171
    @naxcyber1171 Před rokem +1

    It’s so true it’s painful.

  • @zeniththetoaster9712
    @zeniththetoaster9712 Před rokem +2

    I'm going into cybersecurity and this literally sounds like what the professionals who come to give lectures say. If I had a nickel for every time I've heard LastPass mentioned...

  • @beyondsingularity
    @beyondsingularity Před 10 měsíci +1

    This is actually pretty good security training.

  • @coco0847
    @coco0847 Před rokem +3

    very entertaining,,and Informative too

  • @gnuPirate
    @gnuPirate Před rokem +1

    This is all hilarious, but these videos are also highly educational!!

  • @dfreeuns
    @dfreeuns Před rokem +1

    Fucking hell. After 30 years in IT I never thought of "password manager" in this way. I'm dying from laughter rn.

  • @45545videos
    @45545videos Před 6 měsíci +1

    "In terms of security all Windows is horrible"

  • @Ciubix8513
    @Ciubix8513 Před rokem +2

    I use Arch btw

  • @uKhyta
    @uKhyta Před rokem +6

    Fantastic Video!
    Can we get one for LaTeX?

  • @mohan43u
    @mohan43u Před 11 měsíci +1

    are we going to ignore 3:02 the greatest secure operating system here?

  • @Psychx_
    @Psychx_ Před rokem

    This is pure gold. TYVM! I'm looking forward to the next video.

  • @FlabbyTabby
    @FlabbyTabby Před rokem +1

    These are....... actually good points

  • @MIDNITE69
    @MIDNITE69 Před měsícem

    This is more relevant this year than ever

  • @MakingYouTube
    @MakingYouTube Před 8 dny

    I work as a SOC analyst and this should be in every in company training

  • @B20C0
    @B20C0 Před rokem +1

    This is actually really solid advice :-D

  • @zeo_crash7984
    @zeo_crash7984 Před 6 měsíci +1

    2:50 This is not wrong. I worked at a company a long time ago. The owner refused to shell out the money for antivirus software. One morning before i came into the office one of the support guys had had to go get a faulty machine from a client's site. The machine in question had a virus. Once the guy got it back to the office he found that the machine turned on but he couldn't make it respond to any keyboard or mouse input. In a moment of what can only be described as pure genius he decided the next thing he should try was connecting via RDP. so he plugged the infected machine into the network with no virus scanners. I arrived in the office shortly after and it was a horror show.

  • @funmath3835
    @funmath3835 Před rokem +1

    first non -sleepy security guide. order without menu

  • @JohnZakaria
    @JohnZakaria Před rokem +7

    I don't like the slides style
    It is better when he only talks

  • @jacobham5298
    @jacobham5298 Před rokem +3

    Friday night phishin

  • @Yupppi
    @Yupppi Před 7 měsíci +1

    I died at "I use arch linux so I'm beyond humans, but that still doesn't make me safe" how can you hit the punchline at the beginning of the video already.

  • @krisztiankoblos1948
    @krisztiankoblos1948 Před 6 měsíci

    3:20 the USB wrong, wrong , right was Epic.

  • @MarkRuvald
    @MarkRuvald Před rokem +1

    I expected ffmpeg to be mentioned in credits.

  • @frenchfryinyourmcdonaldsba8688

    best one so far

  • @hopefulrational9855
    @hopefulrational9855 Před rokem +3

    Please make one on hardware engineers

  • @justinbeere
    @justinbeere Před 8 měsíci

    I received a phishing while reading this video. Thanks Walter