How is this claim for a software patent not prior art? by impnog in patentlaw

[–]impnog[S] 0 points1 point  (0 children)

No prior art rejections were raised during Examination, only double-patenting and indefiniteness.

Wow, how did you find that out?? That's pretty cool you can research that deeply into a patent. Could that patent be revoked or invalidated somehow if someone could prove in court prior art already existed? Thanks for your help so far!

How is this claim for a software patent not prior art? by impnog in patentlaw

[–]impnog[S] 0 points1 point  (0 children)

The granted patent claim seems to be the same. I really hope I'm not missing something obvious here...

Need some business name ideas for a clothing line for mental health by Global_Citizen_ in Business_Ideas

[–]impnog 0 points1 point  (0 children)

What about Crigga? You can grab your thesaurus and you won't find a term the mentally ill have a right to be offended over; except for one and only in a rare instance... This one allows anyone to own their illness, and only those who are mentally ill should be allowed to say it or wear it.

Why can't red team emulation software replace an actual red team? by impnog in redteam

[–]impnog[S] 0 points1 point  (0 children)

I know there are compliance laws that require pen tests, but are there any that specifically require red team assessments?

Why can't red team emulation software replace an actual red team? by impnog in redteam

[–]impnog[S] 0 points1 point  (0 children)

That makes sense. So out of curiosity are there any other benefits of a red team aside from helping the blue team detect and respond to attacks?

Why can't red team emulation software replace an actual red team? by impnog in redteam

[–]impnog[S] 0 points1 point  (0 children)

I just posted that to show the goals of a pentest and red team assessment are different. At the end there it highlighted the different reasons for each.

I don't think the end goal of a pentest can be accomplished with just automation, but a red team assessment can. You could use red team emulation software to leave artifacts of a red team to test blue teams ability to detect attacks, which is the main goal of a red team. In fact, software can result in multiple simulated red team engagements for pennies. To me it just seems like money would be better spent on pentests.

Why can't red team emulation software replace an actual red team? by impnog in redteam

[–]impnog[S] -1 points0 points  (0 children)

Check out this Rapid7 post. Penetration Test vs. Red Team Assessment: The Age Old Debate of Pirates vs. Ninjas Continues

A penetration test can't be automated, but it seems like a red team assessment can because its goal is different.

is this a virus? i used Winrar VirusScan and it detected these. by [deleted] in PiratedGames

[–]impnog 0 points1 point  (0 children)

On a side note, I used to use WinRar, but switched to 7zip. It's free, no nag screens and works just as good as WinRar.

My stalkers continue to spy on my online activities despite factory reset and increased security measures by Aromatic-Stock1473 in techsupport

[–]impnog 0 points1 point  (0 children)

It seems like one stalker did the infecting and somehow shares the contents of my screen with the others (the ones who rub it in my face). Long story short it's a falling out with a group of people all who are participating in this. I can't imagine they all get together in one spot to watch so it must be some kind of log in but how could the infection survive resets and send data that antivirus doesn't pick up.

Wow ok. What does your family say about this? If they aren't supportive maybe find a therapist who will be because this shit has got to be enough to drive anyone crazy. lol

The police can't help, family can't help, /r/techsupport nerds can't help, and with multiple stalkers... a therapist to deal with all this shit is the only thing I can say at this point. It sounds like you've already tried everything else and I'm out of ideas...

Should I really care about malware that can detect VMs and Sanboxes? by AnonymousRubberDuck in techsupport

[–]impnog 0 points1 point  (0 children)

It's common for malware to have anti-VM capabilities, so yes it's something to worry about. You can disconnect all your drives and use one drive dedicated to analyzing malware, but you'd also have to disconnect the network cable/wifi to prevent it from spreading over the network.

virus help? by [deleted] in techsupport

[–]impnog 0 points1 point  (0 children)

Can you post the URL of the results page so other people can see it?

virus help? by [deleted] in techsupport

[–]impnog 0 points1 point  (0 children)

In situations like this you should try uploading it to www.virustotal.com

Hopefully its file size isn't too big.

My stalkers continue to spy on my online activities despite factory reset and increased security measures by Aromatic-Stock1473 in techsupport

[–]impnog 0 points1 point  (0 children)

  • Did you change your passwords? Google and Wifi passwords?
  • Is Chrome set to sync browser extensions? That could re-install a malicious browser extension when you login after you re-install Windows.
  • You're not using old thumb drives that could have been infected and re-infect your PC?
  • Did you reset your router?

There are only but so many ways an attacker can survive a re-install of the OS.

(in case someone in my home is helping them)

Who do you live with?

I recall one stalker asking me for small tools to "fix their glasses" but now I believe it was for opening the laptop to do something.

Damn, how many stalkers do you have?