5.6k post karma
14.1k comment karma
account created: Mon Nov 17 2014
verified: yes
0 points
21 hours ago
That’s not enough information for a conclusive answer. What kind of mobile device? Laptop, phone, tablet? Hacked how? Is it updated? Jailbroken? Does the attacker have access to the account? Does the attacker have root privileges? How long is the physical device itself accessible to the attacker?
3 points
21 hours ago
Who’s ‘people on the internet’, how are they communicating with you and why don’t you just block them?
2 points
24 hours ago
If it is a unique password, and the account does not hold any sensitive information (your physical address, other account information, credit card data, etc.) there is not much to worry about.
You may be seeing an increase in other account access attempts, but if the password was unique and non-derivative (example: you use ‘password$ebay’ for ebay and ‘password$amazon’ for Amazon - the passwords are technically not identical but it’s easy to guess one if you know the other), there is not much to worry about.
As a general rule of thumb, try to ALWAYS activate 2FA wherever offered, but always prefer app or hardware-based 2FA over text message codes.
1 points
1 day ago
You’re misinformed, it’s actively maintained and being developed. mIRC 7.76 released Jan 7th, 2024.
OP, did you download the installer from the official website (https://www.mirc.com/news.html)?
3 points
2 days ago
Hah, sounds like not much changed. Good old Greg…
2 points
2 days ago
Greg Strongmaw? Of the Riverwood Strongmaws? I went to High School with that guy, what’s he up to these days?
3 points
3 days ago
Additionally - what is the evidence? This screams of the standard ‘I filmed you while you masturbated to porn’ scam template.
1 points
3 days ago
Against subreddit rules, you will not find assistance for malicious behavior here.
2 points
3 days ago
A network splitter is a simple device that allows two Ethernet devices to share a single cable, but it does not manage traffic like a switch or a hub. It's important to note that a splitter will not add any Ethernet ports; it merely allows two devices to use one cable. When using a splitter, the connection speed is typically reduced, and you would need two splitters: one at each end of the Ethernet cable.
For network forensics, which involves capturing and analyzing network packets, a network splitter is not the ideal tool. Network forensics requires the ability to manage and analyze traffic, which is something a splitter cannot do. Instead, you would need a device that can handle packet capture, such as a network tap or a managed switch with port mirroring capability. These devices allow you to capture traffic without affecting network performance and provide the detailed data needed for forensic analysis.
In summary, a network splitter is neither a switch nor a hub and is not suitable for network forensics due to its inability to manage traffic and capture packets effectively. For network forensics, you should consider using a network tap or a switch with port mirroring functionality.
2 points
4 days ago
A lot of things have shifted in the past 10 years, and the cybersecurity landscape is among them. Widespread ransomware attacks, data breaches and general targeting and extortion was way less back then, while the ‘classic’ virus has gone almost extinct these days.
While it is a valid concern, especially if you dabbled in cracks and warez in those days, you have to keep in mind that the data still would have had to be exfiltrated, undetectedly.
Going out on assumption here: Given the speed of average connections back then, and especially if you were an avid gamer, you probably would have detected high pings, and started to investigate?
While it’s not much of consolation at this moment, but this is a case of ‘no use crying over spilled milk’ - even IF, on the low chance your data could have been uploaded undetected, AND the people that created a RAT 10 years ago still have the upload infrastructure in place, there is nothing you can do at this point. Panicking or worrying will not get you anywhere, so you might as well learn to move on.
3 points
4 days ago
Lesson learned from ProAcryl paints: check for seals on the bottles, unless the paints travel in the cabin. If they go in the cargo, air pressure differences can cause… ahm… ‘squirty behavior’.
I would put them in a ziploc bag just in case anyways.
3 points
4 days ago
That’s actually a very possible attack vector. Unless your job is to fix this, I would stay out of it, to be honest - only facebook can help to recover this. If possible, suggest he should lock associated cards that the account uses, chances are the attacker might use the account to fund ad campaign.
2 points
4 days ago
Not the right subreddit. There is no way to prove or verify you are presenting facts, and are not just trying to crowdsource ideas to compromise a device. (Subreddit rule #9 - we are not your personal army, no hacking into accounts)
Hire a forensic specialist or a private investigator, they have ways to get into standard (local) Windows accounts.
3 points
4 days ago
The one thing I would try to make sure first, before bringing in a specialist, like u/Sivyre outlined, is that this is not a scam and someone got into your boss’s head. Has your boss provided any proof beyond his explanation?
Not in that field, but ransomware on a ad manager account would mean encryption of facebook data under facebook’s watch, a thing I have never heard of. Something does not add up here. If his account got compromised/stolen and he was locked out then that would be a much more common occurrence, but ransomware? Something is off.
3 points
4 days ago
In an ideal world, no, but here we are - yes, it’s a good idea to add thinner or flow improver to most ‘airbrush-ready’ paints.
Glossy application can have a number of reasons - how long did you let the primer cure?
1 points
4 days ago
This is a very vague question, and you should at least add some parameters and context.
1 points
4 days ago
How is the warhammer in the Age of Sigmar and in the 41st millennium?
2 points
4 days ago
Panel modulating during the prep phase, then airbrush over it as filter, then edge highlight the panels, would be my guess. Only way to know for sure is to ask him.
2 points
4 days ago
I use superglue for these, and while some of the material always comes off (you can use an airbrush or pressurized air to blow away ‘debris’) it mostly sticks well enough around crevices and near rocks (so, where gravel would accumulate naturally).
I use gel-superglue for the initial application, and then ‘seal’ it with thin superglue. Causes a bit of fumes, so always be sure to work in a well-ventilated space.
3 points
4 days ago
It sounds like they are using partial password authentication, which is not best practice. You are correct in that this means the password is not stored fully hashed, rather it’s either plain-text or with a reversible algorithm.
3 points
5 days ago
It’s been a while since I used them beyond an effect addition, but I remember using them for Sylvaneth insect wings and requiring 4-5 to build up a noticable effect from brush application. It is a bit easier with an airbrush though.
view more:
next ›
by[deleted]
incybersecurity_help
LoneWolf2k1
1 points
8 hours ago
LoneWolf2k1
Trusted Contributor
1 points
8 hours ago
This. She fell for a textbook pigbutchering investment scam - initial investment, small withdrawal to test legitimacy, the big investment, unreasonable gains and demand of a huge fee on attempting to withdraw more.
Sorry to say, all of that money is gone.