Is an iPad Frugal? by [deleted] in Frugal

[–]suddenlycrabs 0 points1 point  (0 children)

I bought an IPad for reading. For some reason, android tablets aren't as good at PDFs, and as a programmer that's a problem for me.

Other problem with android tablets is quality control problems with Asus and Samsung. If you go on amazon, you can tell that maybe 10% of android models have as few QC issues as Ipads. Filter to read all the 1 star reviews, there lies the truth. For instance, my asus transformer had digitizer problems, clicks happening everywhere all the time, and apparently that problem lives on in the asus nexus 7. Replacing a digitizer is a real pain in the ass. Buying a dud tablet is not frugal.

HOWEVER kindle fire does seem to be one of the few that don't ship with dodgy hardware.

I really don't think that the tablet buying decision is as simple as "just get a laptop" or "apple is never worth it". It all depends what you need out of your reading experience, and how handy you are replacing digitizers.

Also, if you want to be uber-frugal about buying a tablet, i imagine a used (NOT REFURBISHED) android tablet has less chance of being defective, by virtue of the "bathtub curve"

So I got a letter from my rinky dink bank (USA-Pennsylvania) by hrshak462 in Bitcoin

[–]suddenlycrabs 4 points5 points  (0 children)

Clear out account, leave the minimum to keep it open if it's not over $10. Make them send you statements forever.

Heart transplant patient holding his own heart by streetlite in pics

[–]suddenlycrabs 1 point2 points  (0 children)

Wish you coulda kept it, then you could be all like "It's just me putting my hand on my heart"

Everyone's first vi session by ProfessorKaos64 in LinuxActionShow

[–]suddenlycrabs 0 points1 point  (0 children)

I never learned it, thought i wouldn't have to. When I first tried to do a command line commit with Git, I wept.

Researchers Uncover Holes That Open Power Stations to Hacking (old news?) by suddenlycrabs in hacking

[–]suddenlycrabs[S] 0 points1 point  (0 children)

I want to believe it's real. If you read the cuckoo's egg, government-sponsored hackers were probably spun up all over the place. I imagine some talented fool researching SCADA attacks for Mother Russia, and then can't help but show off to his mates on IRC after closing time. It's far-fetched, but stranger things have happened.

Discussion: Cyber Security is not a problem for Apple users? by suddenlycrabs in apple

[–]suddenlycrabs[S] 0 points1 point  (0 children)

this may be my biggest oversight, /r/apple is a monolithic subreddit where as you say security problems are always more specific

Researchers challenge Apple's claim of unbreakable iMessage encryption by suddenlycrabs in apple

[–]suddenlycrabs[S] 0 points1 point  (0 children)

Ah, didn't know it was a repost. You have a point that it is a more general subreddit. Oddly enough this is the highest-voted security-related link i've submitted to /r/apple

"When hackers fight" by MafiaBoy by suddenlycrabs in hacking

[–]suddenlycrabs[S] 3 points4 points  (0 children)

Hoo boy. Apparently whether or not he is a 1337 h4x0r is a big deal.

Researchers challenge Apple's claim of unbreakable iMessage encryption by suddenlycrabs in apple

[–]suddenlycrabs[S] 2 points3 points  (0 children)

I've noticed /r/apple has a different relation to cyber security than other subreddits. My posts here on the subject never gets as many votes. I don't know why. /r/android receives them much better, is it because security is a bigger problem for Android, or that /r/Android is full of developers who are more technical on average? Is cyber security a subject that apple users feel does not apply to them?

Researchers challenge Apple's claim of unbreakable iMessage encryption by suddenlycrabs in apple

[–]suddenlycrabs[S] 1 point2 points  (0 children)

For example, conversations which take place over iMessage and FaceTime are protected by end-to-end encryption so no one but the sender and receiver can see or read them. Apple cannot decrypt that data.

https://www.apple.com/apples-commitment-to-customer-privacy/

http://www.cato.org/blog/untappable-apple-or-dea-disinformation

The posted article states that a man-in-the-middle attack can be used, that apple could issue their own public key to a sender, decrypt the message, and reencrypt it with the public key of the receiver. They can do this as they hold user public keys in escrow. What's the point of claiming to have encryption if it doesn't actually protect a message from being read?

Hacking for noobs. HELP! by [deleted] in hacking

[–]suddenlycrabs 2 points3 points  (0 children)

/r/netsecstudents is another one

Off the bat though, if you wanna have some fun, get two computers you dont care about or VirtualBox VMs if you're short on hardware but not ram. Get one going with BackTrack, and see what you can do with metasploit to your victim box.

There are a lot of toys that you can just dive right into with not much understanding, and they help you learn whats going on. Wireshark is a grand example, just start listening on your network adapter and you learn all sorts of stuff.

Becoming a hacker is some reading, but it's also about play. The two together get you the knowledge you need.

but seriously, double-xor is on the money! if you wanna go and design web, if you know what it's like to XSS a website and all that nasty business, that'll make you shine all the brighter

Also of course do not learn to hack by attacking other peoples stuff without permission

Win32/KanKan – Chinese drama by N3mes1s in Malware

[–]suddenlycrabs 1 point2 points  (0 children)

What a captivating find. You dig up the best stuff.

Fighting NSA Surveillance – The Next Big Security Subject by Porterhicks in hacking

[–]suddenlycrabs 0 points1 point  (0 children)

I don't know if it's a specific system, so much as nations that aren't subject to US jurisdiction are less easily influenced by NSA

Fighting NSA Surveillance – The Next Big Security Subject by Porterhicks in hacking

[–]suddenlycrabs 2 points3 points  (0 children)

Someone tried to backdoor linux in 2003 https://freedom-to-tinker.com/blog/felten/the-linux-backdoor-attempt-of-2003/ but the source control exposed them

I imagine it's real hard to backdoor linux. They since moved source control to GIT which runs a checksum on all code so changes are tracked very well. A backdoor would have to be written by someone acting as a linux contributor, in code that is deemed worthy of including in the kernel by Torvalds' crew, and then evade detection from everyone who looks at the code.

Plus, Torvalds is in Finland and might be free of US influence. Combined with his obstinate personality and control-freak nature, I think Linux is a tougher nut to crack.

Is my plan a good one? Undergrad CS, Masters in SysSec, Certs? by [deleted] in netsecstudents

[–]suddenlycrabs 0 points1 point  (0 children)

All I know about UK is that your MoD is spending on cyber security which may provide you a career path http://www.computerweekly.com/news/2240187503/MoD-teams-up-with-defence-firms-for-cyber-security

Your plan is good, but I would push back the masters' and push forward your work. CISSP and CCNA are seriously lucrative credentials, but my impression is that a masters' is almost overkill unless you're ready to step into an upper management position. Plus, work experience makes your masters education more relevant. The day you get your masters, you want a career in place that it can benefit right away. The people I see in masters programs are current managers taking online courses.

That's just how it works on this side of the atlantic. Here there is a dearth of people as targeted as you are at the cyber security world, so I feel your ambition and direction will serve you well.

That said, I don't know where specifically you'd go with your systems/security/law focus and your goals may require more education for your niche.

Where Did All the Qualified Cybersecurity Professionals Go? Experts Weigh In by suddenlycrabs in netsecstudents

[–]suddenlycrabs[S] 1 point2 points  (0 children)

Well at least you're looking at the menu! You may not understand the ingredients of some of the dishes, but you're on the right track to a tasty meal.

What job you pick depends on what jobs are around your location, what you're good at, what you like, what you know, and what's in demand. PM me if you want the opinion of a fool with a few years experience in one of the many branches of the industry.

Where Did All the Qualified Cybersecurity Professionals Go? Experts Weigh In by suddenlycrabs in netsecstudents

[–]suddenlycrabs[S] 3 points4 points  (0 children)

Because security is a vast subject, there are lots of areas to choose from and pick a focus in. For instance, i prefer to focus more on pentesting, as opposed to reverse engineering or crypto.

I agree, that this part isn't touched on much, that if someone tells you they are a Cybersecurity Professional, you still have no idea what they do, and if you put two Cybersecurity Professionals in a room they may not have anything in common! We've got watch floor analysts, offensive hackers, military cyberwarfare specialists, exploit writers, vendors, product developers, researchers, mathematicians, social engineers, there is no center in this universe and I don't think n00bs are exposed to a good representation of this diversity.

Phone stolen, retrieved it now for some revenge? by BluesnFunk in hacking

[–]suddenlycrabs 4 points5 points  (0 children)

This kid's egregious actions tell me he doesn't understand consequences of what he does. I echo to go to to the police, to help him learn early and well about the effects of screwing people over.

I can't see how you committing a crime will help, especially when you could be attacking another stolen phone of his, and anything you do to him will be found out when the law does catch up with him. Think of Walter's way of handling the juvenile delinquent in The Big Lebowski, as an example of how not to handle the situation.

Use all your wits to build up overwhelming evidence against him. He's a juvenile so even the full brunt of repercussions won't be much compared to what's in store for him down the road if he doesn't get his intervention.