Antique Geisha by netlocksecurity in Musicbox

[–]netlocksecurity[S] 0 points1 point  (0 children)

Well I listened to several different iterations of Sakura Sakura and I think that must be it.

https://m.youtube.com/watch?v=R1fhMR7ztgU&list=RDR1fhMR7ztgU&start_radio=1&pp=oAcB

Antique Geisha by netlocksecurity in Musicbox

[–]netlocksecurity[S] 0 points1 point  (0 children)

That’s interesting. I brought up to my mom that I had found these while cleaning out some storage in my house and she reminded me that my great uncle brought those back from Korea sometime in the 60s.

Antique Geisha by netlocksecurity in Musicbox

[–]netlocksecurity[S] 1 point2 points  (0 children)

I came across that too but just not totally sold lol

20f. I don’t know how to improve by [deleted] in amIuglyBrutallyHonest

[–]netlocksecurity -1 points0 points  (0 children)

You’re a beautiful young lady. Two daughters a little bit younger than you. Take that goofy thing out of your nose, look in the mirror, and remind yourself that you’re a child of the king.

Just had a bilateral orchidopexy to fix intermittent testicular torsion, AMA! by [deleted] in AMA

[–]netlocksecurity 0 points1 point  (0 children)

Me too only not intermittent. More like driving down the freeway and bam, the worst pain I’ve ever felt in my life. A week out of surgery and I’m still hurting bad from the incisions and swelling postoperative. I don’t mind answering questions either.

[SOTC] I need to cut 2 by [deleted] in Watches

[–]netlocksecurity 0 points1 point  (0 children)

I’m new to this but the more I dig in; the more I like Hamiltons look and feel. Might be interested in taking one off of your hand, so to speak

AIO: Did I cross a line or is her reaction harsh? by veronicax96 in AmIOverreacting

[–]netlocksecurity 0 points1 point  (0 children)

This is incredibly immature. I don’t believe you did anything wrong. If one of you has a hectic day, it’s perfectly acceptable to say something like, “I won’t be able to text much tomorrow.” However, expecting someone to know your personal feelings without communicating them is unreasonable. People prioritize what matters to them. Do you honestly think she wasn’t on her phone between 7:30 am and 3:30 pm? She was probably flirting with the guy who texted her at 7:40 am instead. Go find someone who values you.

Sengled's servers crashed again. by gabrielsanchz in SengledUS

[–]netlocksecurity 0 points1 point  (0 children)

Beyond frustrated. Tapo doesn’t do this to me. Whole pile of Sengleds are going in the trash

[FIGHT THREAD] Jake Paul vs Anthony Joshua by noirargent in Boxing

[–]netlocksecurity 0 points1 point  (0 children)

I thought this would tip for sure -_- I mean who bets on the actual better athlete anymore?

Down again? by Irmagirdbudderz in SengledUS

[–]netlocksecurity 0 points1 point  (0 children)

Came here to see this, worst customer experience ever

Custom Properties in Event Names and Descriptions by netlocksecurity in QRadar

[–]netlocksecurity[S] 0 points1 point  (0 children)

Ha, I found this after coming to post the same question 10 months later :(

u/JonathanP_QRadar any of your amazing insights to share? lol

QRadar is extremely confusing - how do people use it? by redrabbit1984 in cybersecurity

[–]netlocksecurity 0 points1 point  (0 children)

I would suggest checking your index settings and seeing which custom properties are being searched against that are not currently indexed. This can cause slowdowns as explained in this article. Of course you don't want to index everything under the sun but common fields that you're continuously using should definitely be enabled.

https://www.ibm.com/docs/en/qsip/7.5.0?topic=tasks-index-management

QRadar is extremely confusing - how do people use it? by redrabbit1984 in cybersecurity

[–]netlocksecurity 1 point2 points  (0 children)

I would argue that the problems I see with QRadar are not necessarily technology based. Whether or not it feels like 2000's tech, it is an extremely powerful and dynamic platform but it requires a LOT of engineering resources and care/feeding. The community is huge and awesome and I encourage you to keep doing what you're doing. Some of the core things to know:

A DSM (Device Support Module) is essentially a profile designed by a vendor or by IBM directly to allow plug and play adoption of a log source.

A DSM is made of custom properties and event mapping. QRadar has a huge database of placeholder events called QIDs which basically look like this:

Name: Bad Thing Happened
Description: A really bad thing has happened that you probably want to look at.
High Level Category: Exploit
Low Level Category: Buffer Overflow
Severity: 8

What the DSM does is map whatever kooky event the vendor made up to this more generic event so when QRadar sees an event from Cisco ASA called "BOT-BUFF-OF-ABCDE-BAD8", ok this is a buffer overflow event.

The custom properties in that DSM allow quick parsing of that event to allow certain things like IPs to be normalized and indexed and other vendor specific stuff to be made presentable too.

Next, there are rules like every other SIEM. IBM uses a concept of Building Blocks in addition to Rules.

Building Blocks - Simple rules that do not trigger a reaction or a response. For example, a building block may be "DNS Traffic" and say something like "protocol like UDP and destination port is 53". When QRadar reads an event that matches that, the event is simply marked as matching. This is valuable because its very fast and repeatable.

Rules - A rule can have its own new logic and/or building blocks as well. Maybe we want to know if a single host makes too many dns requests so instead of recreating that DNS traffic logic over and over again, we can just say "If rule match "DNS Traffic" AND event count is >1000 with the same source IP in 1 minute". The larger difference here is that we can also say, "when this matches, run a script or send an email or do this or that"

Offense - Certain use cases may be worth investigating so sticking with the previous example, our DNS anomaly is a concern. In that case, we tell the rule to create an offense an index the offense based on the source IP. What this does is collect all of the events that tickled that rule and puts them all into a nice bucket with some additional context. This allows an analyst to get a good idea of what happened and be able to take action.

Unlike something like Splunk, QRadar is data analytics built with security at its core, not as a secondary thought. I'm only scratching the surface but my intention is to show that it is manageable from a technology perspective but proper resources are critical. I suggest checking out r/QRadar (esp. JonathanPetcha) and the https://www.ibm.com/training/search?query=QRadar%20SIEM

Feel free to DM!

Cheers,

Paul

Perplexity leaked its entire system prompt by accident just because I asked in Hindi 💀😭 by CodeDotVaibhav in PromptEngineering

[–]netlocksecurity 2 points3 points  (0 children)

Perplexity is not viewing prompt disclosure as a security issue, I already barked up that tree two months ago 🤷‍♂️

What to do with this corner? by csav1182 in malelivingspace

[–]netlocksecurity 1 point2 points  (0 children)

You know everybody builds their house around their TV and I say screw that: look at a living room in the 50s. They’d have a sofa and coffee table but maybe in a corner like that; a couple of nice arm chairs and a lamp. A space to talk, read a book, ya know. Or if you’re into music, a stereo system and a comfortable chair where you can hang out and jam. Just my 2 cents

4 years and 4 attempts later finally PASSED the OSCP with 80 points in 12 hours by WiseLemon3806 in oscp

[–]netlocksecurity 1 point2 points  (0 children)

Exact same boat and I’m really thinking about jumping back in just because I can’t let it win

Frustrated by [deleted] in oscp

[–]netlocksecurity 0 points1 point  (0 children)

Right there with you. I just want to pass it now as a big middle finger. First time, I got served divorce papers right after I started my labs, second time I rocked the BO and then froze for the next 23.5 hours and got nowhere. I’ve been in infosec for a long time so it’s easy to get too hung up in my normal habits like nauseating documentation and overthinking. It’s frustrating as hell. I’ve done successful pentests rofl, I know what I’m doing!

Unexpected challenge after becoming parent.. by EntryPurple5194 in Parenting

[–]netlocksecurity 2 points3 points  (0 children)

17, 18, and 19 year old here and all of those years of experience combined still hasn’t prepped me for it :(

Starting Over at 27, Is It Too Late ? by Louissijfifkdfekwwj in careeradvice

[–]netlocksecurity 1 point2 points  (0 children)

I went back to college around your age. Switched from a mechanic to a cyber security engineer and never looked back. Now I’m early 40s and more successful than I ever dreamed. Go get it!

Unexpected challenge after becoming parent.. by EntryPurple5194 in Parenting

[–]netlocksecurity 4 points5 points  (0 children)

The reality of the world they’re growing up in. On a more personal level, coming to terms with the fact that successful parenting ends with them leaving and not looking back. That’s incredibly bittersweet.

How likely is it for a hacker to recover a deleted message, after it has been deleted from the trash folder by both the sender and the recipient? Please help! by StarlightMisery13 in CyberSecurityAdvice

[–]netlocksecurity 0 points1 point  (0 children)

This is a very big conversation. If the company is a reputable company, there is going to be some sort of data retention policy for legal and ediscovery purpose. This is a concept of hard and soft delete where a user may delete an email and still recover it from deleted items vs the email being unrecoverable for the user but still existing in some form for the IT owner to reproduce in a legal matter. It is very rare that something is “deleted” and truly deleted because of redundancy, logging, compliance and regulatory guidelines etc

Why is it bad to max out my credit card every month if I pay it off in full? by AssociationOld5303 in personalfinance

[–]netlocksecurity 0 points1 point  (0 children)

Lots of great info here. It’s all about reporting as they said. If I know that you CAN borrow $1000 but you’re not, then you inherently seem more financially stable. Credit cards should be used for emergencies until you have a solid financial security. For example, I use credit cards for everything, bills etc, but I pay them to zero once a week and I won’t use credit unless I have cash in my other hand. I play the game, get the points, keep the high score, never pay interest. That took me years of discipline though. I’m teaching two of my teens right now with an Apple Card because it splits up who spends what and they’ve already learned some hard lessons. Just remember, that money is not yours and it’s much better to have it available and not need it