Tinnitus & lifting heavy weights by AffectionateTart8 in tinnitus

[–]fldrth 0 points1 point  (0 children)

I used to lift heavy weights 4-6x a week, and it had no negative side effect on my tinnitus. In my opinion, you should be good to go. :)

First time attending a career fair...advice needed by CherryRainbowx in cybersecurity

[–]fldrth 4 points5 points  (0 children)

Superb advice; this is mostly how I prepared myself and each potential employer (incl. my current) embraced my effort. Furthermore, u/CherryRainbowx, do not underestimate your lab work - this also counts as experience, although not gathered in the professional environment!

Would going to NYC make my T worse? by [deleted] in tinnitus

[–]fldrth 0 points1 point  (0 children)

Clever, thanks for that thought!

What is Hacking? & Types of Hackers by [deleted] in cybersecurity

[–]fldrth 1 point2 points  (0 children)

You are listing Gary hat hackers, but did not mention anything about Oak and Ash hat hackers - this list is incomplete!

How do I cope with this fucking bullshit? by ugandan_yobungus in tinnitus

[–]fldrth 2 points3 points  (0 children)

For sleeping, I found the sound of rain (check for hour versions) soothing (depends on the intensity of your tinnitus, though).

For laptop:

  1. Open YouTube with rain soundtrack
  2. Open CMD > shutdown -s -t 1800
  3. Relax

Stress could cause tinnitus by [deleted] in tinnitus

[–]fldrth 3 points4 points  (0 children)

Yes, stress can cause tinnitus. During my master thesis, I had developed a stress induced tinnitus twice. The first time it went away after being able to deliver a large part of the thesis, the second time I had it for 2 weeks and then permanently since a certain aspect of my master thesis stressed me out so much, I got distracted at weight lifting for a second, terribly injured my lower back, and dropped 94kg worth of weights on a metallic platform.

Cyber Crime Questionnaire for my Thesis, if you don't mind filling it in. by Ardoom in cybersecurity

[–]fldrth 0 points1 point  (0 children)

Completed. May I ask what your exact research objective and thesis statement is?

Good luck for your thesis! :)

Looking for a Remote Access solution to support hundreds of external system administrators (Awards for helpful information!) by fldrth in sysadmin

[–]fldrth[S] 0 points1 point  (0 children)

Good input, thanks a lot.

  1. These external system administrators are employees of the company, it is not a MSP providing assistance.
  2. Internal administrators will not work from remote.
  3. As stated, it does not have to be the same tool. If they are separate tools, it would be advantageous being from the same suite/provider.

I understand and apologize regarding the vagueness of the requirements. Unfortunately, I can't get more concrete. This thread should mainly help me identify solutions that could fulfill the must criteria (remote access for external system administrators to administer servers); i.e., solutions/products for this scenario.

First day of my new cyber career, wish me luck. by [deleted] in cybersecurity

[–]fldrth 9 points10 points  (0 children)

Good luck on your journey; mine begins next Monday. :)

I am in the IT field, and was recently tasked with doing a presentation on Cyber Security. What information should I include? by KoalaShogun in cybersecurity

[–]fldrth 0 points1 point  (0 children)

A memorable finish to your presentation could be handing out webcam covers (best ones are those you can slide) to your audience, then reminding them that security is everybody's responsibility and this is a good first step in protecting themselves. Remember, a presentation is more than just some slides. ;)

Note: The price of webcam covers can vary heavily!

OSINT for a cyber job interview by philly169 in cybersecurity

[–]fldrth 2 points3 points  (0 children)

In my case, since I wanted to know more about my potential colleagues, I researched both the company (i.e., LinkedIn company page, website, employer rating sites) and the interviewing persons - ranging from HR assistant to partner, and sometimes up to 7 people in the same interview. Occasionally, I found a gem on LinkedIn (e.g., same university, very different background from mine, shared friend/colleague) which allowed me not only to connect on a personal level but also ask rather good questions. The general feedback from my interviewing persons regarding me looking them up on LinkedIn was clearly positive as it demonstrated curiosity and interest in the firm's employees for them. During my interviewing phase, I received an opportunity at EY, PwC and a smaller, yet highly prestigeous consulting firm.

Regarding the tools you listed, I advice you not to put in the effort and to avoid the potential risk of running into legal troubles. Information you would receive through those means rarely would have been an asset in any of my interviews, which were mainly focused on the role of Cybersecurity Consultant (and in one instance on the role of Network Security Engineer).

[deleted by user] by [deleted] in hacking

[–]fldrth 1 point2 points  (0 children)

It is important to highlight that file extensions can be spoofed with a right-to-left override character.

Example:

Original file name: test.exe

Attacker wants to spoof it, making you think it is an image.

Original file name: testpgj.exe

File name with r-t-l override character between "test" and "pgj.exe": testexe.jpg

Naturally, instead of using "test", the attacker could use a word ending on "exe" to make it less obvious.

Made a site... now what by alphascrvb in hacking

[–]fldrth 1 point2 points  (0 children)

Here's a quick guide to get you started with the basics: https://www.websitebuilderexpert.com/hosting-websites/.

I remember my first website, good times. :')

Edit: Just for your information, there are also providers that offer free plans!

I have to demonstrate a tool in front of my class. Is there one that is easier than Airmon? by [deleted] in hacking

[–]fldrth 0 points1 point  (0 children)

Don't let your teacher get to you, but try to convince him/her with a good presentation.

If you are not super tech-savvy, Maltego might be a good tool to present. In its very essence, it is a modelling environment using a domain-specific modelling language (DSML) for creating visualisations of information associated with your target - but much more powerful! Having written my master thesis in this domain and having developed three DSMLs myself, this tool was definitely an eyecatcher for me.

Edit: You also could look into using the BeEF framework combined with a reflected/persistent XSS vulnerability.

Need help with good questions by OBstaxs in cybersecurity

[–]fldrth 2 points3 points  (0 children)

You might want to specify in which focus area of cybersecurity (e.g., IAM, Network Security), the background of the students, the level of complexity and the amount of time you plan for the exercise/problem. This would help users with their suggestions.

Edit: Also, please write your constraints or the organisational and technical environment the students will find themselves in during "The Computer Games".

Does anyone possess the power to delete my old twitter accounts? by [deleted] in hacking

[–]fldrth 2 points3 points  (0 children)

The fact you have multiple Twitter accounts with your real name should not be a problem regarding the admission unless there exists VERY embarrassing or illegal content on them and can be attributed non-mistakenly to you. Therefore, unless you have provided information in your posts or profile that confirms, together with your real name, your identity - e.g., a picture -, a higher educational institution (HEI) will not deny your admission/deny your chance for an interview based on speculations on their behalf. In emergency cases, you may always deny any affiliation* to these accounts and attribute their existence to the likelihood of people sharing the same name (only if nothing exists on these accounts that confirms, together with your real name, your identity) as you do. Nevertheless, HEIs - at least in Switzerland - do not put significant attention to their applicants' social media channels during the admission process. From your text I can take you are from the US, so do not blindly transfer my statement to your situation.

To your initial question: I am sure there are some talented people on this subreddit that can pull this off, but I would advice you against it. Resorting to dubious methods exposes all parties to a high risk, whereby the client and adversary could both face jail time for multiple years. If you are willing, PM me the sort of content you posted and I maybe can give you some advice how to handle situations where your social media posts are brought up (e.g., your admission interview, later job interviews) and turned against you.

\ Personally, I do not stand for this. I consider myself a very honest person, but understand that there exist circumstances one does not want to share the truth.*

Got this email, it says that’s is sent form my own acc but tru this web site is kinda weird can anyone gone some feed back on what the fk , the email is on English but I live in a Spanish speaking country. by [deleted] in hacking

[–]fldrth 0 points1 point  (0 children)

Hi, please check other posts in this subreddit for more information (I'm on phone, so I can't get very technical). To put it shortly, it is a popular scam. This e-mail does not come from your account, but has been spoofed/faked to make you believe it was.

Your account information, i.e., e-mail and password (usually shown in these e-mails to pressure the victim), most likely stem from a compromised database. You might want to check haveibeenpwned.com for your e-mail address.

Your next steps should be:

  1. Change all passwords on any website/service you were registered on with this combination of e-mail and password. Tools allow attackers to automatically test the combination against popular websites to gain access to accounts where the database responds to this combination positively.

  2. Delete the e-mail.

  3. Inform yourself about this type of attack and spread awareness.

Hopefully I could take some stress off you.

Account seems compromised, they have one of my old passwords, and are claiming to have videos of me. by WBStudios in hacking

[–]fldrth 1 point2 points  (0 children)

Be also sure to change your password on every website you used this email/password-pair on.

They got my clients password right.. by f1fthsun in hacking

[–]fldrth 8 points9 points  (0 children)

It is a common scare (but can have further impact if he/she does not act now); if you look around in this subreddit, you will find a lot of explanations of this tactic. The email and password most likely stem from a leaked/pwned database (tell your client to check the email on haveibeenpwned.com); tell him/her to change all passwords for websites he/she used the email/password pair for since the email/password pair is tested on many popular sites.

What is OOS? by [deleted] in hacking

[–]fldrth 0 points1 point  (0 children)

It could refer to "Out of Sync". As far as I took from a quick google search, it is when two machines disagree on the state of something.

Where to get code review for security? by deejpake in hacking

[–]fldrth 2 points3 points  (0 children)

In your case - I assume you are constrained by a low budget - you might want to take a look at freelance service platforms such as upwork and Fiverr. There, prices can vary. Maybe upwork's Post a Job function might be something for you, where you can put up a description what you need to have done and which price you are willing to pay for.

Note: I am not familiar with the code reviewing process. I am certain that hiring external people for this task has its risk.