Cybersecurity professional with an interest/background in networking. Beginning to delve into binary exploitation and reverse engineering.

  • 0 Posts
  • 12 Comments
Joined 1 year ago
cake
Cake day: March 27th, 2024

help-circle
  • Exactly. The only thing that I really have to add is that I personally draw the line between social media and other types of websites or internet services is whether the service is intended to be used anonymously or connected to a real identity. I’d further divide the anonymous stuff between whether they are intended to be used with handles or without an account at all.

    Under that personal definition, I would not consider stuff like BBS, Usenet, forums, AIM, etc., to be social media.

    I also wouldn’t consider Discord to be social media tbh, it’s a messaging application. If Discord is social media why isn’t iMessage?

    Something like Twitter, BlueSky, or Mastadon could be social media depending on how you use them, but since many people do utilize them with accounts linked to their real identity I would consider them social media.

    Then you have the obvious social media stuff like FaceBook, and LinkedIn.

    Now that I’m typing this out, stuff like Insta, TikTok, Snap, etc., get weird. I would personally consider them social media, but tons of people use those apps with handles. Maybe in addition to the anonymous or real identity thing there’s also the consideration of whether the site or app is intended to connect you with people you know in meatspace or online.

    Yeah, I guess the distinctions I personally use are becoming a bit meaningless now.


  • It also swings the other way. Young boys are getting red pilled by YouTubers and influencers like Andrew Tate and his ilk, and I would prefer those kids to learn who they are and how they relate to and fit into their community before being exposed to that sort of toxic content.

    As others have said here though, the right tact here would have probably been to legislate away the algorithmic content feeds themselves instead of regulating kids having accounts. YouTube will still push related videos without an account, so I don’t see how this particular route helps at all.




  • I’m a big fan of MikroTik for enterprise grade routers without the subscription/licensing shit, and at a much more affordable price than stuff from Cisco, Arista, Juniper, etc. I have my ISP router set up in bridge mode, so it just passes all traffic through to my MikroTik router. Then the firewall stuff is all on the Tik.

    You can hook the server’s NICs up to the sfp+ switch, but still connect the ilo to the copper 1G switch. So you still have router on stick to sfp+ switch, then 1G switches both connect to sfp+ switch. If you want to dive into ospf or stp/rstp you can create loops, so wiring the switches to each other and all to the router, but theres obv some more configuration stuff to learn with all that.

    Idk maybe I’m misunderstanding. In the spirit of the original article, you should add another server to your lab and run eve-ng bare metal on it so you can simulate huge network topologies before buying new networking gear and make the cops think your grow op is even bigger.



  • This cleared up my confusion, thanks!

    I’m familiar with reveng from a malware and security testing point of view, using tools like IDA, Binja, Ghidra, etc., so I was aware that decompilers are taking the compiled assembly instructions, then recreating Intermediate Language and pseudo-C stuff without debugging info or original function names and stuff, but I was missing the key point of game assets not being distributable.