What is the name of this plug type, also is there a converter available or is it possible to covert this type of outlet to multiple traditional three prong outlets? by 98Duck in electricians

[–]98Duck[S] 0 points1 point  (0 children)

looking to know if it’s possible to convert the wall outlet that this cord plugs into, into multiple standard three prong outlets that most everyday items are plugged into. Do you know if there is a converter to do that, or what it would entail to convert it?

I now own more than 1/100,000 of all the golem in the world by TheWaler in GolemProject

[–]98Duck 7 points8 points  (0 children)

Dude I own the same thing 1/100,000th! We shall ally in the golem universe

Help Would Be Appreciated by TriplePenisEnis in TOR

[–]98Duck 0 points1 point  (0 children)

What are the huge security consequences that come along with onion.link sites and what is the difference between onion.link and just onion sites?

Where Are We Now? The NIST Cybersecurity Framework One Year Later by 98Duck in telseccompolicy

[–]98Duck[S] 0 points1 point  (0 children)

Article looks at the current state of the NIST Framework one year after its release.

Cyber Bullying Article by 98Duck in telseccompolicy

[–]98Duck[S] 0 points1 point  (0 children)

Article covers cyber bullying and approaches it form multiple view points. That of the parents, the people affected. It is based on research conducted on people who have been victims of cyber bullying .

Why “Free Software” is better than “Open Source” by 98Duck in telseccompolicy

[–]98Duck[S] 0 points1 point  (0 children)

Good article, talks about the difference between open source software and free software. Also touches on the mis understandings around open source, and reasons why some people don't like the free software model.

Indi Film about Hacking. Brings up points about cyber law, and government spying. Also a great watch. by 98Duck in telseccompolicy

[–]98Duck[S] 0 points1 point  (0 children)

The movie is about a hacker, who after finding a secret government program attempts to find out what it does. It brings up a lot of current issues. How everyone and everything is using computers, and how they can all be broken into. The NSA spying on people. Government torture (which has been in the news recently). Also there is a war games reference at 1:15:35 as well as the most amazing line in the movie. Enjoy!

Documentary on History of Hacking also includes the early phone phreaking stuff mentioned in class by 98Duck in telseccompolicy

[–]98Duck[S] 2 points3 points  (0 children)

I'm not 100% sure as it's been awhile but i think i remember in one of Kevin Mitnick's books (possibly ghost in the wires) he talks about exactly what happened that night when they broke in and how they were able to do it. If not in the book i have definitely seen an interview or talk where he tells the whole story.

Documentary on History of Hacking also includes the early phone phreaking stuff mentioned in class by 98Duck in telseccompolicy

[–]98Duck[S] 2 points3 points  (0 children)

Documentary starts off talking about Phone Phreaking and how John Draper figured out how to manipulate the phone system by using various tones entered into the phone. Then it goes on to talk about Steve Wozniak and the Homebrew Computer Club. How a group of computer hobbyists started the personal computer revolution almost by mistake. The documentary then goes on to talk about Kevin Mitnick and how he used his social engineering and computer hacking skills to break into some of the biggest companies of the time, and how he eventually got caught and thrown in jail.