

deleted by creator


deleted by creator


In 1999+ you could sniff people’s passwords in clear text right out of the air on public WiFi networks. tcpdump port 110 and just watch them roll in.
In the late 90’s you could use a floppy disk to boot nt and dump the password hashes of anybody who had logged in, then run them through a dictionary attack which would take a matter of minutes before learning that your company’s top employees used their favorite football team or cartoon character as their password without even appending some numbers to it. Dude with the football password even had the password emblazoned in his office wall.
One time in the 90’s I got to a password prompt and just held enter, and eventually was just let past the password prompt.
In X windows if you managed to kill the screensaver password entry box you were dropped back to the desktop, and people found ways to crash the screensaver by overrunning the password input buffer by pasting input repeatedly using common keyboard shortcuts. (Pretty sure this same exact bug exited in early Mac osx versions.)


What if the cops have a trace buster buster?


deleted by creator


Reserve time during your week to leave your phone at home, and leave your house for 1-4 hours. Bring a paperback book, oe visit a library and check one out. Go out for coffee and pay with cash. Go to a park with your book and coffee. Maybe bring a sandwich. Promise that you will not leave for an hour even if you start to go crazy.


What’s Up Tiger Lily
Allen took footage from a Japanese spy film, International Secret Police: Key of Keys (1965), and overdubbed it with completely original dialogue that had nothing to do with the plot of the original film. He both put in new scenes and rearranged the order of existing scenes, producing a one-hour movie from the 93 minutes of the original film. He completely changed the tone of the film from a James Bond clone into a comedy about the search for the world’s best egg salad recipe.


deleted by creator


deleted by creator


deleted by creator


Great analogy, because even that is getting smaller.
Edit: add link


Welcome to 2001, when we had 56k at home, and corporate broadband 802.11b networks never had passwords.


Video;DW. Anybody have a summary?
deleted by creator


I hear what you’re saying, but I’d still like to see numbers before taking a stance.


That was my first thought too, but I’m not so sure. I’d love to see data on it. I did a quick search and couldn’t find any numbers, but I did find articles talking about Amazon requiring exclusivity in some cases. https://www.ingramspark.com/blog/amazon-exclusive-options-createspace-kdp-select-and-acx


It was also founded in San Francisco.


What about the divisive masculinist agenda?
Other unixes are over there like “hey, I kill just as much as Linux does!”


Run strace (or falco) and log every file open. When you hear the sound, reference the log of what files were accessed at that time.
Run tcpdump and capture all traffic. Analyze it in wireshark, searching for a time window around when the sounds happened.
FWIW putting pranks like this in cron or systemd is a common way to haze people who have bad security practices. We also used to set the default run level to 3 or 6, but of course that doesn’t make sense in the era of systemd.
Why are we even called the “United States”?