Jump to content

mynameisnick4

Member
  • Posts

    10
  • Joined

  • Last visited

Awards

This user doesn't have any awards

mynameisnick4's Achievements

  1. Right click>view image? I was doing this prior to this update to get the full size image and it still works just fine.
  2. Everyone just wraps there phones in clunky plastic cases anyway, which is why I don't really care about the use of higher quality materials. Same goes with phone thickness. I have an S6 and only enjoyed the improved designed and nicer materials for about a day until my case came in. Give me a durable phone with a large replaceable battery and memory expansion and I'm good to go.
  3. The first thing I did when I got my surface was replace the short cable with a much longer one. But I'll take a new free one because I think I lost the other one.
  4. Are we sure that the person that received this popup wasn't using an older docsis 2.0 modem like this gem that was super popular? Because if they were then that pop-up is most likely valid because you can't get over 38mbps with docsis 2.0. I have Comcast with my own docsis 3.0 modem and have never seen that pop-up.
  5. Yeah, they obviously tried to sell this whole car thing hard but nothing about that case reminds me of a car other than the camo lol
  6. For those that don't understand the logos all over it, it's most likely a play on the camouflage you see on unreleased cars while they are being tested. Though nothing about that case reminds me of a Ferrari.
  7. I don't think Dave Chappelle needs free publiciity at this point lol
  8. I'm curious if ransomware can get drives that are locked with bitlocker. So you have your backup drive locked with bitlocker, unlock it to back up your files, and then relock it when your done. If this software just goes out and encrypts the files it can touch, then I think that would stop it. Well at least stop it from getting your backups.
  9. Yeah I'm pretty sure that is the case. They would have to be on your network to be able to hit your server or other PCs. This whole thing seems odd to me because if they are just brute forcing logins to get in via RDP just to install the software, they are going about it in a really hard way. By default RDP is disabled on windows PCs and most non tech people don't even realize it exists. You then have to turn it on AND disable windows firewall or add rules to allow it. Then to make it available via the internet you have to open it in your firewall and NAT it to the server/computer you want. Again, something your average person would have no clue how to do nor even understand the process. Then to top it all off, they would have to find that specific public IP to hit then brute force the login. Plus there may be a chance the account isn't even a local admin or have the privelages to install software. This seems very inprobable to use as a method to install the ransomware vs other methods like just tricking the person or dumping the software online as something its not (pirated software, fake drivers, etc.)
  10. I'm curious if this applies to people who have RDP opened up to the internet or just locally. If it is for people that have it locally, that means they would have to first get on your local network and then hit your computer from there. You really shouldn't have RDP opened to the internet anyway unless you have a firewall capable of configuring ACLs to only allow certain IP/IP ranges through to RDP to your computer. If you actually do have RDP opened and NATed to your desktop with no firewall stopping anyone, then you are asking for something like this to happen.
×