Fife wrote:I thought Charlie Brown Dolomite was still a bridge too far this crowd, but you smashed it. /saluteSpeaker to Animals wrote:
Waiting on some bitch to offer to pop an Alka-Seltzer before Halloween now....
There was a bridge?
Fife wrote:I thought Charlie Brown Dolomite was still a bridge too far this crowd, but you smashed it. /saluteSpeaker to Animals wrote:
Waiting on some bitch to offer to pop an Alka-Seltzer before Halloween now....
Speaker to Animals wrote:Fife wrote:I thought Charlie Brown Dolomite was still a bridge too far this crowd, but you smashed it. /saluteSpeaker to Animals wrote:
Waiting on some bitch to offer to pop an Alka-Seltzer before Halloween now....
There was a bridge?
Lol, seems that the liberal elite doesn't like the working snobs out there.C-Mag wrote:Breaking
California Wine Country on Fire
14 Wildfires
1500 Structures Lost
All Fires started at nearly the same time
Potential Act of Terrorism
The military becomes aware of Windows/NSA spying. :facepalm:Nukedog wrote:A Mysterious Virus Has Infiltrated America's Drone Program
"The virus, first detected nearly two weeks ago by the military’s Host-Based Security System, has not prevented pilots at Creech Air Force Base in Nevada from flying their missions overseas. Nor have there been any confirmed incidents of classified information being lost or sent to an outside source. But the virus has resisted multiple efforts to remove it from Creech’s computers, network security specialists say. And the infection underscores the ongoing security risks in what has become the US military’s most important weapons system.
“We keep wiping it off, and it keeps coming back,” says a source familiar with the network infection, one of three that told Danger Room about the virus. “We think it’s benign. But we just don’t know.”
Military network security specialists aren’t sure whether the virus and its so-called “keylogger” payload were introduced intentionally or by accident; it may be a common piece of malware that just happened to make its way into these sensitive networks. The specialists don’t know exactly how far the virus has spread. But they’re sure that the infection has hit both classified and unclassified machines at Creech. That raises the possibility, at least, that secret data may have been captured by the keylogger, and then transmitted over the public internet to someone outside the military chain of command."
http://www.zerohedge.com/news/2017-10-0 ... ne-program
This is why I have disabled computers from using USB drives... also no attachments are allowed to be downloaded to the computer unless they come from/to our domain. Even whitelisted domains go through a scan before they hit the network....GrumpyCatFace wrote:The military becomes aware of Windows/NSA spying. :facepalm:Nukedog wrote:A Mysterious Virus Has Infiltrated America's Drone Program
"The virus, first detected nearly two weeks ago by the military’s Host-Based Security System, has not prevented pilots at Creech Air Force Base in Nevada from flying their missions overseas. Nor have there been any confirmed incidents of classified information being lost or sent to an outside source. But the virus has resisted multiple efforts to remove it from Creech’s computers, network security specialists say. And the infection underscores the ongoing security risks in what has become the US military’s most important weapons system.
“We keep wiping it off, and it keeps coming back,” says a source familiar with the network infection, one of three that told Danger Room about the virus. “We think it’s benign. But we just don’t know.”
Military network security specialists aren’t sure whether the virus and its so-called “keylogger” payload were introduced intentionally or by accident; it may be a common piece of malware that just happened to make its way into these sensitive networks. The specialists don’t know exactly how far the virus has spread. But they’re sure that the infection has hit both classified and unclassified machines at Creech. That raises the possibility, at least, that secret data may have been captured by the keylogger, and then transmitted over the public internet to someone outside the military chain of command."
http://www.zerohedge.com/news/2017-10-0 ... ne-program
An apt question beyond just IT security; same goes for the inverse.The Conservative wrote:
If I can do this, why can't the government?
Martin Hash wrote:Liberty allows people to get their jollies any way they want. Just don't expect to masturbate with my lotion.
Doesn’t matter homey. Unca Sam Gonna watch you anyway. It’s built into the OS, and probably the hardware now.The Conservative wrote:This is why I have disabled computers from using USB drives... also no attachments are allowed to be downloaded to the computer unless they come from/to our domain. Even whitelisted domains go through a scan before they hit the network....GrumpyCatFace wrote:The military becomes aware of Windows/NSA spying. :facepalm:Nukedog wrote:A Mysterious Virus Has Infiltrated America's Drone Program
"The virus, first detected nearly two weeks ago by the military’s Host-Based Security System, has not prevented pilots at Creech Air Force Base in Nevada from flying their missions overseas. Nor have there been any confirmed incidents of classified information being lost or sent to an outside source. But the virus has resisted multiple efforts to remove it from Creech’s computers, network security specialists say. And the infection underscores the ongoing security risks in what has become the US military’s most important weapons system.
“We keep wiping it off, and it keeps coming back,” says a source familiar with the network infection, one of three that told Danger Room about the virus. “We think it’s benign. But we just don’t know.”
Military network security specialists aren’t sure whether the virus and its so-called “keylogger” payload were introduced intentionally or by accident; it may be a common piece of malware that just happened to make its way into these sensitive networks. The specialists don’t know exactly how far the virus has spread. But they’re sure that the infection has hit both classified and unclassified machines at Creech. That raises the possibility, at least, that secret data may have been captured by the keylogger, and then transmitted over the public internet to someone outside the military chain of command."
http://www.zerohedge.com/news/2017-10-0 ... ne-program
I also have it so that if a system gets infected it's automatically removed from the network, and won't be allowed on till the issue is resolved.
If I can do this, why can't the government?
You make my brain hurt... really... it throbs every time I try to wrap my head around your logic...GrumpyCatFace wrote:Doesn’t matter homey. Unca Sam Gonna watch you anyway. It’s built into the OS, and probably the hardware now.The Conservative wrote:This is why I have disabled computers from using USB drives... also no attachments are allowed to be downloaded to the computer unless they come from/to our domain. Even whitelisted domains go through a scan before they hit the network....GrumpyCatFace wrote:
The military becomes aware of Windows/NSA spying. :facepalm:
I also have it so that if a system gets infected it's automatically removed from the network, and won't be allowed on till the issue is resolved.
If I can do this, why can't the government?
Unless you're willing to sit on a packet sniffer all day, you will never, ever stop them. And even then, they could just super-impose it into the flow.The Conservative wrote:You make my brain hurt... really... it throbs every time I try to wrap my head around your logic...GrumpyCatFace wrote:Doesn’t matter homey. Unca Sam Gonna watch you anyway. It’s built into the OS, and probably the hardware now.The Conservative wrote:
This is why I have disabled computers from using USB drives... also no attachments are allowed to be downloaded to the computer unless they come from/to our domain. Even whitelisted domains go through a scan before they hit the network....
I also have it so that if a system gets infected it's automatically removed from the network, and won't be allowed on till the issue is resolved.
If I can do this, why can't the government?
A proper network admin controls every form of communication internally and externally. Even with SSH security, you can check what is going on inside the pipeline if you know how to do it. With the notification and reports that Intel and the CIA, as well as other forms of alphabet soup, have been interacting together to create backdoors, we as administrators have been finding ways to patch these holes.
We never can protect 100%, but if we create a network like how we want to see the internet protected, the vast majority of issues and situations can be resolved before they even get into, or out of the internal network.