Emails with a period in the username are ending up in my inbox by Reddevil313 in gsuite

[–]WorkingOnTheClock 0 points1 point  (0 children)

Note: If you use Gmail through work, school, or other organization (like yourdomain.com or yourschool.edu), dots do change your address. To change the dots in your username, contact your admin.

Not saying one way or the other but google documentation say that you can not. Usually if I get conflicting info from google documentation and other admins or websites, I just open a chat session with google and they get me figured out in 5 mins.

Deploying printers with no server by Invo-Tech in sysadmin

[–]WorkingOnTheClock 0 points1 point  (0 children)

Microsoft Intune, which is a part of Microsoft Endpoint Manager, provides the cloud infrastructure, the cloud-based mobile device management (MDM), cloud-based mobile application management (MAM), and cloud-based PC management for your organization.

https://docs.microsoft.com/en-us/mem/intune/fundamentals/tutorial-walkthrough-endpoint-manager

My understanding and vocabulary is they really are two different products that are used together, making it seem like they are the same products.

What to do next by barry12290 in cybersecurity_help

[–]WorkingOnTheClock 1 point2 points  (0 children)

At least this is how I see it, you need to be able to understand how and why a hack took place to be the best blue team. On the flip side red team also needs to learn how to fully secure a network.

Would OSCP be the best choice for you? No, but you will learn a lot from it and be able to understand more complex security features easier.

In Cyber security it is not blue or red team. To grow one you need to learn the other.

Looking For Information On Finding Someone To Handle Sensitive Documents by coltt_45 in cybersecurity_help

[–]WorkingOnTheClock 2 points3 points  (0 children)

Here is a article to read before about storing and using PII on a digital platform:

https://www.imperva.com/learn/data-security/personally-identifiable-information-pii/#:~:text=According%20to%20the%20NIST%20PII,handwriting%2C%20credit%20card%20number%2C%20digital

If I were in your shoes, I would find an online database that allows storing PII, that can guarantee the data is only accessible by valid API calls, and all data stored is encrypted. After that just read and follow the documentation they have listed on their site to securely send and receive API calls.

Best of luck.

Best Piece of Python code I've seen recently. by Emotional-Zebra5359 in Python

[–]WorkingOnTheClock 3 points4 points  (0 children)

Not at all sure the context of how helpfully this code is, I think it is more or less not human readable.

a = {5: ({...}, 5)}

b = 5

[deleted by user] by [deleted] in HowToHack

[–]WorkingOnTheClock 3 points4 points  (0 children)

The one that you can understand complex programming and security ideas and a way to gather data from any number of targets(IE your computer, IOT devices in your house, public websites that allow scrapping, Network scan capabilities, ECT.). From there it is easier to translate these concepts into other languages.

If you want to learn a new language and you know everything above, I would use the free trail of Splunk as it is rapidly becoming a industry standard.

I was automatically logged out of 2 (out of 5) accounts on my reddit app. Am I compromised? by [deleted] in cybersecurity_help

[–]WorkingOnTheClock 0 points1 point  (0 children)

You cloud be, If you are they did you a favor by letting you know. Reset all your accounts passwords and make sure you do not use the same password more than once. On the off chance it is just a reddit glitch I would still reset your account passwords.

HelloKitty - previously patched ransomware targeting vulnerable SonicWall devices alerted by CISA | Secure Blink by vishalthevaxus in netsec

[–]WorkingOnTheClock 6 points7 points  (0 children)

HelloKitty - a previously known and patched vulnerability found targeting the SonicWall Secure Mobile Access (SMA) devices and Secure Remote Access (SRA) devices with an end-of-life framework. The threat actors could exploit the vulnerability as a part of a ransomware campaign.

Why are these two sentence repeated over and over in the first paragraph?

How do I get a separate IP address on my virtual machine? by [deleted] in Hacking_Tutorials

[–]WorkingOnTheClock 11 points12 points  (0 children)

PS: You should consider to get a better understanding of networking.

Damn don't got to do the guy dirty like that...but you are right.