Jump to content

AbydosOne

Member
  • Posts

    3,659
  • Joined

  • Last visited

Everything posted by AbydosOne

  1. Some eBay hunting for a 1TB SATA M.2 SSD (long story, I have a motherboard with a SATA-only M.2 slot) found me this gem:

     

    image.png.5bc90aafbd8d76795e00cf67a60b2e79.png

     

    image.png.be82955bf72ac3cb47ee47fc0a03dcfc.png

     

    image.png.4702c60d06d0ec836aee6051028c0f9e.png

     

    Yeah, buddy, not a (legit) Samsung... or NVMe... or M.2...

    1. soldier_ph

      soldier_ph

      Open it up and show us that glorious 64 GB MicroSD Card which probably has WannaCry on it, or at least a Keylogger.

  2. TBH, this is a pretty standard rate of emailing for a marketing push, especially when you're trying to "convert" someone who already showed interest. These aren't unsolicited if you started making an account, and they're reminding you to finish it. If you have a problem with those emails, use the unsubscribe link in the email.
  3. I went through three different Windows tablets over a 5-6 year span before I gave up on the concept and bought a convertible laptop. Dell Venue 8 Pro ($200-ish): Win8 on 2GB of RAM was horrible. Screen got really discolored for some reason. Microsoft Surface Pro 2 ($500-ish used): the battery management died so it always reported a full battery. Asus Transformer T102HA ($300-ish): the CMOS battery died, so the clock wouldn't stay synchronized when it went to "sleep".
  4. You can only expand to the "right" in your drive. You'll need to use a disk partitioning software (with a preboot environment) in order to move your Windows install partitions over to the "left" into the unallocated space so you can expand to the "right".
  5. image.png.d2ed95467fd37b0d20e84d43725c8330.png

     

    I... don't know how to answer this... question?

  6. AbydosOne

    XM4 headphones

    I've used my XM4s on Zoom calls on my laptop without issues... you should be able to change the audio and microphone inputs away from the "headset" settings to the other options.
  7. Use \\[IP address]\Share Drive\ instead of \\TV-PC\Share Drive\. Sometimes the local domain names don't get registered properly with your gateway, so IPs are the foolproof method.
  8. Well, I'll be... IT got back to me... They actually just dictionary/brute-forced it. That's actually kinda neat.
  9. This is different scenario than we're discussing. If a bad actor had direct access to the server, we can surmise that encryption keys are either known or bypassed. If I send encrypted plaintext of my password, bad actor now knows my plaintext password. If I send encrypted hash of my password, bad actor knows my hash, but not the text. Either way, they can (in theory) use that password/hash to authenticate my account on this particular authentication system. The utility of knowing a password is to try it on different authentication systems. Assuming competent authentication design, the hashes will be salted to a particular application and submitting them to a different one will not result in a valid authentication (not saying there aren't incompetent ones out there). My presumption is that AD servers store that password as a salted hash, and only ever receive a salted hash from the client via encrypted (TLS/SSL) channel (which seems logical, right?). So how does IT (functionally existing at the "direct access to server" point) know enough about the contents of my password for it to not pass audit if the plaintext is never sent to the AD server and (presumably) they didn't spend the time to brute-force unhash everyone's passwords?
  10. Encryption keys can be stolen; hash functions need to be brute-forced (there are some optimizations, which is why salting exists, but there's no universal reverse function by definition).
  11. Hash algorithms are deterministic? If I hash my password or the AD server hashes my password, it's still the same hash... so why send encrypted-but-plaintext password when you could send encrypted-and-hashed password? Why have a remote cleartext step at all? All the server needs to do is compare the hashes, it doesn't need to know the original password string, right? Seems like a massive security hole to have cleartext passwords in RAM outside the client PC.
  12. My understanding of password validation is that they compare the "encrypted"/hashed values. Passwords shouldn't ever be "decrypted", I'm pretty sure, especially if the "encryption" is a hash algorithm that is computationally very expensive to reverse.
  13. Nothing that runs before login, that I'm aware of. Obviously they have third-party permissions management, but I don't think it's low-level enough to get into the login process. Well that's not sketchy at all... maybe I should stop writing posts from my work computer lol
  14. Yeah, this was the part that stands out. I haven't changed it since last June, and it didn't flag it then, so somehow they're accessing it in plaintext after the fact. I emailed them back, just to see if someone would reach out to me about it (I doubt they will).
  15. Lately, my corporate IT has taken it upon itself to "audit" our passwords and declare any as "being vulnerable to modern hacking techniques" (i.e. contain personally relevant strings, like, say, address number) needing to be changed. I know exactly why my password doesn't pass muster (though work is the only place I use it, so IMO it's not that vulnerable, I'm just stubborn and our IT is notoriously not-competent), I'm just a little incensed that somehow IT can view passwords in plaintext!? Does Active Directory not store hashed passwords? Is there a hashing algorithm that can extract substrings for comparison? 1 Or is IT really so hypocritical as to actually store/unencrypt passwords in plaintext somewhere and then tell *us* to be more secure? 1 = The only way I could think this would be possible would be that the "hash" of the password would actually be a collection of hashes of various substrings when it's made, but I can't find an evidence that this is true.
  16. Hire an electrician before you hurt someone. There's no shame in admitting you don't know, and a bruised ego is better than a smoldering pile of ash.
  17. AbydosOne

    Having to fire up a Windows 98 PC so that I can…

    There's a standalone program out there that will do it. IDR what it's called though.
  18. Sounds like there's a short in the laptop and the brick is shutting down to prevent damage.
  19. AbydosOne

    Detroit: Become Human is sooo good you guys

    I think that's just called 'entropy'.
  20. What does USBTreeView show for all three of them?
  21. Baader-Meinhof Effect has to be a real thing:

     

    There's a PA speaker in the trash at work. I proudly told my boss that I had resisted taking it. He explained it would be pointless because they're 70V driven. I did not know this.

     

    Ten minutes later, this post was made: 

     

    This keeps happening to me. This is stuff I would recall if I already knew it or if I encountered it often.

     

  22. Actually, I saw this exact MO a week or two ago: make a simple post, get a few responses, make another post later that day, then go nuclear without provocation. Just saying it's a pattern, not an incident.
  23. That still requires a DisplayPort input. My initial question is "why not just use an DP MST hub and two active DP->HDMI adapters?" The only usecase I see is for Macs, which don't support MST (for some reason)... I'd get a DisplayLink adapter (not a knockoff one). They actually work pretty well for 2D stuff (I can even watch Youtube without issues on mine).
  24. Doesn't exist (practically). HDMI can only support one "display" worth of data at a time; HDMI splitters will just mirror one display onto two (identical) ones. A USB-A to HDMI adapter may fit your needs if you aren't doing anything graphically intense on one of your extra displays.
  25. Make sure your port forwards are both UDP and TCP. I don't believe you need a domain, but I think is somewhat integral to having a "true" crypto cert (which isn't really necessary for personal use). To the credit of the PiVPN devs, it really does just work (much to my surprise, since the last time I tried to set up a VPN, it broke TrueNAS's VM IP configurations horribly).
×