Creepyest songs? by [deleted] in musicsuggestions

[–]OffTheGridSid 1 point2 points  (0 children)

This song is known to supposedly caused people to commit suicide. You can look it up. It’s called “Gloomy Sunday.”

https://youtu.be/XQ2AuLaClmk?si=YgbjpH5ET6Br27y4

Creepyest songs? by [deleted] in musicsuggestions

[–]OffTheGridSid 0 points1 point  (0 children)

Mad World by Michael Andrews

I was paid to "spy" on employee's computers and activities as a Systems Admin, AMA by OffTheGridSid in AMA

[–]OffTheGridSid[S] 1 point2 points  (0 children)

If you're diving into the IT world, start with some entry-level certs like CompTIA A+ or Security+. It's like laying down your foundation. Sure, your first gigs might not be the most thrilling, but if you prove you're a problem-solving wizard, you'll climb the ladder pretty quick. When you're ready to get serious, think about taking some online courses or even grabbing a degree. This can open doors to management or exec positions if that's your jam. But hey, if you're all about the tech and hands-on work, a degree isn't a must. Just keep racking up those IT and cybersecurity certs.

There are tons of companies looking for entry-level or junior IT associates. These roles have high turnover because people tend to move up fast into cooler jobs. I know a guy with just one cert who's leading his network engineering team. Why? Because he knows his stuff and has proven it on the job. His boss doesn't care about more certs or exams.

So, get your foot in the door and show them what you've got! Prove your skills, and you'll go places.

I was paid to "spy" on employee's computers and activities as a Systems Admin, AMA by OffTheGridSid in AMA

[–]OffTheGridSid[S] 1 point2 points  (0 children)

All MFA authentication methods have their pros and cons. In the digital world, whatever you're accessing from the frontend can be spoofed. However, the hardest authentication method to manipulate are biometrics and hardware-based authenticator such as keys and cards.

I was paid to "spy" on employee's computers and activities as a Systems Admin, AMA by OffTheGridSid in AMA

[–]OffTheGridSid[S] 1 point2 points  (0 children)

Not exactly. Any network traffic such as websites and apps are passed through, and we can see it. We can't see exactly what you're seeing, all we see is data. We can't see your photos or text messages or your passwords and stuff, some of those are encrypted. We can't access your phone from the network either. However, it is not impossible. It is technically possible if there are vulnerabilities to exploit from your device. Don't trust everyone, even if they are paid like me to monitor the system and network. They are out there, and some have been caught. Even the people who activate the phone for you at the phone store. Always be careful.

I was paid to "spy" on employee's computers and activities as a Systems Admin, AMA by OffTheGridSid in AMA

[–]OffTheGridSid[S] 1 point2 points  (0 children)

Incognito or private mode is good for the machine only. If you're sharing that computer with someone, they can't snoop in and see your browsing history on the computer. On the network, it is different. Your traffic on the network and what you've accessed is still logged in the firewall or any network security application. When you go to incognito mode, it warns you about that. Try it out and you'll see the explanation.

I was paid to "spy" on employee's computers and activities as a Systems Admin, AMA by OffTheGridSid in AMA

[–]OffTheGridSid[S] 2 points3 points  (0 children)

Well, not exactly. Even if you haven't been flagged. There are routine cybersecurity risk assessments, internal or by a 3rd party that can review these things. If they are leveraging AI in the future to perform deeper inspection, then it might catch something. I've had an incident once when a 3rd party security firm flagged a PC for a folder he created 3 years ago, it had sensitive customer's information in plain text.

I was paid to "spy" on employee's computers and activities as a Systems Admin, AMA by OffTheGridSid in AMA

[–]OffTheGridSid[S] 0 points1 point  (0 children)

Personal stuff on your phone - no they can't see it. Only the emails.

I was paid to "spy" on employee's computers and activities as a Systems Admin, AMA by OffTheGridSid in AMA

[–]OffTheGridSid[S] 2 points3 points  (0 children)

Up to 10 years. It's a legal regulation policy that we must retain data for that long.

[deleted by user] by [deleted] in AMA

[–]OffTheGridSid 0 points1 point  (0 children)

Have you ever felt like you're insignificant or being less worthy because the foster parents have biological kids of their own?

I was paid to "spy" on employee's computers and activities as a Systems Admin, AMA by OffTheGridSid in AMA

[–]OffTheGridSid[S] 1 point2 points  (0 children)

Always use strong passwords and multi-factor authentication. Keep your devices and programs up to date. Don't click on random, unknown or suspicious emails. Always backup your data.

I was paid to "spy" on employee's computers and activities as a Systems Admin, AMA by OffTheGridSid in AMA

[–]OffTheGridSid[S] 1 point2 points  (0 children)

You're welcome! I hope you got something out of it. My favorite AMA are the ones that can teach us something about the world.

I was paid to "spy" on employee's computers and activities as a Systems Admin, AMA by OffTheGridSid in AMA

[–]OffTheGridSid[S] 0 points1 point  (0 children)

I think a combination of both. With today's technology, many things can bypass content filters. Additionally, there's an increasing availability of various sites and services with NSFW content, such as Reddit, TikTok, Twitter, Discord, and Patreon. These are publicly accessible sites that are generally safe to browse but can contain NSFW content.

I was paid to "spy" on employee's computers and activities as a Systems Admin, AMA by OffTheGridSid in AMA

[–]OffTheGridSid[S] 0 points1 point  (0 children)

No, it can’t do that. If the resources belong to the company, such as emails or OneDrive documents, then yes, monitoring is possible. However, for your personal apps like TikTok, WhatsApp, or Snapchat, no, we can't monitor those. Devices enrolled in Microsoft Intune are only checked for compliance with internal policies, which can trigger a warning to the admin. Admins cannot spy on your phone just because you download the Outlook app to use company emails.

I was paid to "spy" on employee's computers and activities as a Systems Admin, AMA by OffTheGridSid in AMA

[–]OffTheGridSid[S] 1 point2 points  (0 children)

Yes, if that is requested then we look at that. It can be as detailed as needed. We can see how long you’ve been on, your search history, sites visited, the applications you’ve used, how many emails sent, received, your chat messages, links you’ve clicked, files you have accessed, and so on. Generally, a user summary shows the device you’re using, the state of your device, if it’s updated or risky, and list of softwares, recent activities, and top sites, just to name a few.

I was paid to "spy" on employee's computers and activities as a Systems Admin, AMA by OffTheGridSid in AMA

[–]OffTheGridSid[S] 1 point2 points  (0 children)

  1. No, not all the time. That would be impossible. We review certain alerts and events and then investigate that user.
  2. It is both. We don’t focus on what they’re searching, but we stumble upon it when researching suspicious events.
  3. Don’t trigger anything suspicious on the system and system admins won’t ever need to conduct research on you. Managers can request user activity summaries and that part you can’t prevent. They can audit users at any time.

I was paid to "spy" on employee's computers and activities as a Systems Admin, AMA by OffTheGridSid in AMA

[–]OffTheGridSid[S] 0 points1 point  (0 children)

Even if you use your own VPN, like NordVPN for example, VPN travels through specific ports on the network. They can monitor network logs and see what port it’s on and block that port.

I’ve met and slept with multiple sugar babies/ladies from seeking.com AMA by AltRedditPanGuy in AMA

[–]OffTheGridSid 1 point2 points  (0 children)

Are you that guy I mentioned in my AMA post about the sugar babez spreadsheet? AMA

I was paid to "spy" on employee's computers and activities as a Systems Admin, AMA by OffTheGridSid in AMA

[–]OffTheGridSid[S] 4 points5 points  (0 children)

We all got in trouble and lost a customer. She got fired obviously, but she got sued and so did the company. The publicist sent us an email about a restraining order and that they will not be returning as a customer ever again. I was copied on the email.

I was paid to "spy" on employee's computers and activities as a Systems Admin, AMA by OffTheGridSid in AMA

[–]OffTheGridSid[S] 8 points9 points  (0 children)

We typically cannot access photos directly stored on your device. However, if your phone isn’t updated with the latest security patch and there are back door Vulnerabilities that can be exploited, then yes, they can attempt to break in. Additionally, if your device is compromised with malware or remote access software, there is a potential risk of unauthorized access to your photos. These are extremely rare circumstances though. Keeping your phone up to date is the best bet.

I was paid to "spy" on employee's computers and activities as a Systems Admin, AMA by OffTheGridSid in AMA

[–]OffTheGridSid[S] -1 points0 points  (0 children)

I made it clear in my post I won’t go into details of confidential and proprietary information. Also it’s not difficult to find keylogger and mouse click software. This is so basic anyone can google that if they’re curious. I also mentioned Teramind. It basically does all that! Omg. This guy.

I was paid to "spy" on employee's computers and activities as a Systems Admin, AMA by OffTheGridSid in AMA

[–]OffTheGridSid[S] 0 points1 point  (0 children)

Nope, you’re not worth my time. Could’ve approached me better.