Pensacola Discussion Forum
Would you like to react to this message? Create an account in a few clicks or log in to continue.

This is a forum based out of Pensacola Florida.


You are not connected. Please login or register

We're seeing the beginnings of technology inevitably conquering us, and it aint gonna be like in the terminator or the matrix

+2
2seaoat
Hospital Bob
6 posters

Go to page : Previous  1, 2

Go down  Message [Page 2 of 2]

Hospital Bob

Hospital Bob

2seaoat wrote:We are listening to the Germans with the hope they will get pissed and kick us out.....save a trillion here, and save a trillion there.....pretty soon we will be talking about real money.
So the whole thing is a plot to anger all the allies and make them want to kick our military bases out.

How about this for another conspiracy theory.  Our government wants to piss of the Germans so they'll kick out the democratic government and that will open the door for nazis to take over again. Because obama is not only a muslim and a commie but a nazi as well.

Hospital Bob

Hospital Bob

If we can get nazi stuff in this thread we'll go over the thousand mark on the pageviews.  
It's like a circus.  In a circus, it's the trapeeze artists are what gin up the interest.  Here it's the nazis.

Guest


Guest

we are becoming a nanny state.

hospitals here have a bagde making scanner now. anyone who comes into the hospital MUST have a ID. ( good thing they are not voting right ) and they scan your ID and TAKE YOUR PICTURE. then print out a paper badge with your pic on it. YOU have to have one to go visit someone, or you don't go in.

Guest


Guest

2seaoat wrote:It has been argued for years by design, American telecommunication, software, and system developers have left back doors in their systems for National security.  We have for fifty years cornered most of that technology, and it would not take much to compromise a security system if you have a back door and the equipment was manufactured or designed in America.   In 1995 I spoke with a Col. in the Army who was upset with our data mining almost 20 years ago.   He said we had remarkable capabilities 20 years ago, but anybody who is talking on a cell and think they have a secure line is.........a Merkle....pants high and socks showing.....or chancellor of Germany.
Oats is correct.  How many more times will some one have to say "Every thing is monitored" until people get the hint?  The ability to monitor or intercept communication is mind boggling. Some folks just can not believe the truth.  To a lesser degree, look at the GoogleBots on this forum. Do this.  Type some thing in your title like   "Stooderville is the best ball park in the world"  Now go to Google and see if it is there.  Many times it is.
From Google  LOL
(What I googled)
We're seeing the beginnings of technology inevitably conquering us .........................................Results.
pensacoladiscussion.forumotion.com › General Discussion‎
1 day ago - 7 posts - ‎3 authors
So it starts like this. The technology reaches a level that permits obama to listen to the phone conversations of many major world heads of state.

TEOTWAWKI

TEOTWAWKI

Like I said Bob in a previous post. My avatar Gort represents a total submission to the failure of men both on earth and elsewhere to control themselves in a wise and peaceful manner. The most advanced people in the universe had turned that over to Robot policemen with the power to incinerate the entire planet. So looks bleak Bob. You'll be talking on your phone and say the word bomb and a beam from a satellite will vaporize you....good bye Bob.

Guest


Guest

Social Engineers demonstrate the damage that could be caused by information
Final report from DEF CON 21's SECTF contest reveals how leaving information exposed can empower attackers around the world


By Steve Ragan , Staff Writer
October 28, 2013 — CSO — They say knowledge is power, and the final report from DEF CON 21's Social Engineer Capture the Flag contest shows that in the wrong hands, the amount of information organizations leave exposed online can empower attackers across the globe.


[Social engineering: How oversharing information can lead to disaster online]

Over the summer, CSO covered the events of the Social Engineering Capture the Flag (SECTF) contest at DEF CON 21, and the events from just one of the contest's phone calls.

A new report from Social-Engineer Inc. outlines the entire contest, as well as key observations from this year's calls. A contestant pool of 10 men and 10 women used Open Source Intelligence (OSI) to research their target company and collect as much information as possible (flags). Points are awarded based on the flags collected. This information is then used during the contest when the targets are called directly, in order for the contestants to collect additional flags depending on the information they're collecting.

According to the report, the contestants used metadata collection tool Maltego, as well as the usual avenues of information gathering such as Google (Images, Maps, YouTube), LinkedIn, Bing, Facebook, Monster, Twitter, Netcraft, BlogSpot, and more, to details on people and processes within their assigned target. This year's targets included Apple, Boeing, Chevron, Exxon, General Dynamics, GE, GM, Home Depot, Johnson & Johnson, and Walt Disney.

Watching the SECTF contest live is an experience in human interaction. As mentioned, the contestants call their targets and attempt to collect various flags, using a variety of pretexts. Despite the fact that many of the contestants were completely new to the world of social engineering, they made it look easy. Based on the report and seeing the contest live, as well as the number of flags collected, social engineering continues to remain a viable threat or an organization's security.

"Social engineering has played some role in nearly every major hack you have read about over the last few years, yet this year's competition clearly illustrates how poorly prepared companies are to defend against socially engineered attacks," commented Social-Engineer, Inc.'s Chris Hadnagy, the SECTF organizer

"While there continues to be improvements in the quality and preparation of the contestants, there have not been any significant improvements by companies to secure information available on the internet and educate and prepare employees against a disciplined social engineer. For example, one contestant was able to find an improperly secured help desk document that provided log in credentials for the target companys employee-only online portal."

1 2 »

Sponsored content



Back to top  Message [Page 2 of 2]

Go to page : Previous  1, 2

Permissions in this forum:
You cannot reply to topics in this forum