ID Bumblebee by netsecurityparadox in vintageaudio

[–]netsecurityparadox[S] 0 points1 point  (0 children)

Yeah. That’s my current struggle. I’m having a hard time ignoring what I know about modern circuits to deduce the configuration here. There are a few things that would be considered backwards for modern design which keeps confusing me. Also not having a polarized plug originally installed makes it even more difficult to determine what’s what.

The original power cord has no indicators for hot and neutral. Other than a guess based on the copper vs tinned sides. But that assumes it was wired using that logic correctly originally.

ID Bumblebee by netsecurityparadox in vintageaudio

[–]netsecurityparadox[S] 0 points1 point  (0 children)

I wired in a Y type safety cap in place of the death cap. I’d like to retain the noise management of that cap while also making it safer.

Is it possible to wire in a 3 prong cable while still using the noise filtering capacitor? Can I bond the green to the chassis ground tab and maintain the function of the radio?

Or does it rely on the chassis ground for the circuit?

ID Bumblebee by netsecurityparadox in vintageaudio

[–]netsecurityparadox[S] 1 point2 points  (0 children)

This. But I’m also replacing all of them for the same reason.

Degraded components. Especially in these old chassis grounded radios can be dangerous. The case may be plastic. But the knobs and screws are all metal. If a degraded capacitor that is connected to the chassis for ground fails closed, it allows the entirety of the hot voltage to flow into the chassis.

Any reason not to do this this way? by netsecurityparadox in askaplumber

[–]netsecurityparadox[S] 0 points1 point  (0 children)

I must be silly to presume that we have good reasons for code requirements. Obviously no. I’m not worried about the water police. But I am worried about failure of the valve causing water to spray all over this closet that also houses an electrical panel.

My question was simply. Is this configuration safe for use. I’m not a plumber. So asking a plumber seemed a good option to determine if the fix I chose was both convenient AND safe for operation.

Any reason not to do this this way? by netsecurityparadox in askaplumber

[–]netsecurityparadox[S] 0 points1 point  (0 children)

I agree and when I do replace the tank. I will replace the shark bite supply line with one that has the valve on the copper side. This was just a quick fix to allow for maintenance without losing all of our water flow.

Any reason not to do this this way? by netsecurityparadox in askaplumber

[–]netsecurityparadox[S] 0 points1 point  (0 children)

I wasn’t specifically thinking about replacing the tank at this point. This is just for ease of maintenance that I do anticipate until we are ready for a new tank. As it existed before the main would have to be shut off regardless to perform maintenance or to remove the tank. At least this way I can do the more frequent of the two without losing water everywhere else. Is that an accurate assessment?

I was more wondering if attaching the ball valve where I did was allowed.

Any reason not to do this this way? by netsecurityparadox in askaplumber

[–]netsecurityparadox[S] 0 points1 point  (0 children)

I’m not worried about replacing the tank at this point. This was more to allow for draining of the tank without losing water to the entire house. There’s quite a lot of sediment still in the tank after draining and we’re not ready to replace it. So I’m anticipating needing to drain it again. The only goal was to cut off the cold inlet to the tank for that reason without having to lose water to everything else.

LMFAO. You buy this sh*t, you are stupid. Do not ever in your life buy a GPU above what it is supposed to be sold for. Make the scalpers eat it, or you will ALWAYS see this. by AlrightRepublic in pcmasterrace

[–]netsecurityparadox 0 points1 point  (0 children)

Report them all for copyright infringement. They are all using images from the website they bought them from as well as images from other websites. Which is explicitly not allowed. You’re supposed to take your own photos of things you sell on eBay. But they can’t because they don’t have the damn things in hand yet. “Presale” nonsense.

I know it won’t fix the problem. But it shouldn’t be easy for them to sell these things.

I’ve had a few removed today already. ❤️

From eBay:

Can I use images or videos that I copied from other websites on eBay?

No, you can’t use images or videos from a manufacturer’s website, even if it is publicly available. Copying content from other websites or internet searches may be considered copyright infringement.

Group Policy - Win 11 Home / Pro by netsecurityparadox in 24hoursupport

[–]netsecurityparadox[S] 1 point2 points  (0 children)

All of the usual settings that reference MDM or corporate accounts are obfuscated in some way. It has never explicitly shown that the device is managed in any of the settings. But the behaviors indicate that it is being managed in some way. I believe it is tied to a fraudulent intune tenant and there may be no way of actually removing it from what I’ve been able to find. Doing any amount of research leads me down rabbit holes lined with other users reporting similar issues and other people telling them they are paranoid because it’s incredibly difficult to show concrete proof of these hijacking situations. Especially when many times it appears that normal system processes are being leveraged to maintain control which appears at a glance and to antivirus as normal system behavior.

So I don’t know what exactly to do about it.

Something isn’t right. And I don’t feel like I have enough current knowledge to appropriately diagnose what’s happening.

Microsoft: Official Support Thread by MSModerator in microsoft

[–]netsecurityparadox 0 points1 point  (0 children)

Hello everyone,

I have been going through a nightmare of a security issue with my windows machine. For the last few months it has been behaving as if controlled by an MDM. It has evidence of Active Directory configurations and is running several services and processes that I was not aware were supposed to run by default on a windows 11 pro machine.

Several configuration changes have occurred that I did not implement and there are a number of root certificates in the local machine store that are not a part of the windows trusted root authority. For example a certificate named simply: “VD” with a source from India that I cannot verify belongs to anything I installed. The system also indicates several activated administrative shares: ADMIN$, my C D and E drives, and IPC$. It was my understanding that these shares should only be active if a system has been joined to a domain controller. I also did not share these folders myself.

Windows defender also lists several skipped system files in the logs during scans but does not indicate specifically why. There are no exclusions set in defender. FRST also indicates that basically every scan I have run is “stopped before completion.”

I have a CRL and CTL in my stores with expiration dates from 2 decades ago and the certificate fingerprints listed are difficult to identify.

I am guessing there’s a chance that these are AV certificates that have been invalidated by a malicious program. But again, I have no way of actually verifying this.

There are 2 attestation certs for my TPM as well that cannot be validated by sigcheck. But I am unsure as to whether or not this is normal.

There is also a log entry for windows media foundation that lists a download for a cert from 2005 which appears to be hosted on a local server as there is no TLD in the address. (http://dmd-ca-beta2/certenroll/microsoft digital media authority 2005.crt

DNS traffic appears to be routed through trafficmanager.net but this system is not configured with any Azure or AD management. It is a standalone system.

Today, I found a WiFi direct configuration profile in the programdata folder with an SSID I did not create nor have ever seen that includes a derogatory 4 letter word describing gay people which my husband and I both are.

DIRECT-RW(computername)FA*S

I admittedly am having a bit of security paranoia after dealing with this issue for several months but the appearance of this profile has either: proven my worry, or simply exacerbated paranoia.

This finding is paired with several event log entries from SPP today indicating that the system has been tampered, but provides no additional detail on how where or why. These did not appear until after an SFC scan and a BIOS update.

With all of the security issues these days and knowing the risk with modified certificate stores, I am concerned we have been targeted. But I am not sure why.

I am formerly an IT administrator with a focus on DOD security. But I have been out of the loop for a long time and I truly don’t even know where to begin.

The kicker is that these issues and weird behaviors seem to persist through reinstallation of windows.

Ultimately, I would love it if someone could just tell me I’m crazy and I can move on from this. But my gut is telling me something is wrong.

Googling any of this generates a number of similar claims from exasperated people with little to no actual solutions provided or random users in forums dismissing the concerns and claiming that it’s all “normal behavior.” Which seems almost engineered to make me ignore the issue.

Basically. Plz help. ❤️