or to join or start a new Discussion

Articles/all comments
These 45 comments are related to an article called:

Cyber security

Page 2 of 2

posted on 25/9/18

If you create a site selling drugs, in Bitcoin, don't advertise that you're paying somebody to kill another person, then whilst logged into your account, fall for the old couple having an argument then snatching your laptop, before you get a chance to close it routine. Schoolboy error and will lead to life imprisonment.

posted on 25/9/18

Also understand that it was American intelligence that created TOR so if you think you're anonymous, think again.

posted on 25/9/18

Too many of us think cyber security is difficult to understand and expensive to manage.

comment by Admin1 (U1)

posted on 25/9/18

Also if you use free antivirus, please check the online privacy reviews of them. Many of them harvest your full search history

posted on 25/9/18

comment by Afridi14.... You gotta love it!! (U2805)
posted 17 minutes ago
Too many of us think cyber security is difficult to understand....
----------------------------------------------------------------------

This is mainly brought about by people using terms like TOR and VPN and DNS instead of just using he actual words that they stand for.

I haven't got a fVkking clue what this lot are on about.

posted on 25/9/18

Comment deleted by Site Moderator

comment by Admin1 (U1)

posted on 25/9/18

Also the only entire reliable bitcoin wallet is running your own. Which involves storing the entire 180GB block chain on your computer. Unfortunately some folk have used it to disseminate images of minors. So legally I'd probably not use a full bitcoin wallet.

posted on 25/9/18

I built a cyber team in my company a couple of years ago.

The ethical hackers are called Pen Testers. They all get their kicks out of picking locks on doors as a side hobby. Strange bunch but they have helped me out on a few occasions so I like them!!

posted on 25/9/18

Whoever voted this one star is a little hacker...

comment by Sid (U1868)

posted on 25/9/18

Thanks for the advice, much appreciated.

comment by Admin1 (U1)

posted on 25/9/18

comment by T Bone Steak Roysters (U3947)
posted 20 minutes ago
I built a cyber team in my company a couple of years ago.

The ethical hackers are called Pen Testers. They all get their kicks out of picking locks on doors as a side hobby. Strange bunch but they have helped me out on a few occasions so I like them!!


----------------------------------------------------------------------
Was chatting/advising with a university about the subjects they covered. They now offer very popular specific cyber security degrees, but I think it's the wrong tact. You can't properly defend against SQL injection if your understanding of SQL is cursory. It should be a specialisation once you are fully qualified in software engineering.

posted on 25/9/18

I won the Nigerian lottery the other day. Gave them my bank details. Just awaiting payment!

posted on 25/9/18

i only ever post on here in gloves

posted on 25/9/18

Buy a Raspberry Pi, install https://pi-hole.net, use it as your DHCP server instead of your router and marvel at how stuff tracks you. This will also act as a security barrier for dodgy malware on sites.

Also check if port 53 is open on your router. If it is close it right now. The amount of junk routers that have it open by default is stupid.

comment by Verse (U20361)

posted on 25/9/18

A14 nice article!

comment by Admin1 (U1)

posted on 6/10/18

https://www.kaspersky.com/blog/android-8-permissions-guide/

comment by Admin1 (U1)

posted on 23/10/18

https://www.bbc.co.uk/news/technology-45952466

posted on 23/10/18

Comment deleted by Site Moderator

posted on 23/10/18

Can you still download the app if you don't give them permissions?

comment by Admin1 (U1)

posted on 24/10/18

comment by Michael Edwards FC {Proud owner of the 5 000 000th comment} (U2720)
posted 1 day, 8 hours ago
Can you still download the app if you don't give them permissions?
----------------------------------------------------------------------
Some apps accept you restricting permissions, others force it.

Page 2 of 2

Sign in if you want to comment