MnRTV Live Show Wed February 5, 2014 @ 730 EST-Hackers Crackers Code breakers and the NSA - How to protect your PC and your Privacy!

This Wednesday on MnRTV we look at  -Hackers Crackers Code breakers and the NSA - How to protect your PC and your Privacy! These days now we have to worry about Hackers Crackers Code breakers and the NSA when we go online and how safe are we. Are there programs that can make our computers safe from Hackers and Crackers. Is there hardware that can actually stop the NSA from spying on us. Do we need white hackers to discover bugs and software holes and also to keep the government from checking to much info on the public and individual.  Join us for this and the news at the beginning of the show! Youtube link will be up 15 min before the show!


 

Views: 269

Reply to This

Replies to This Discussion

Looks interesting Robert .. Will be listening :)

Thank You Susie it will be a great so hopefully we can help many people with computer security and the nsa

Originally, password crackers were fairly easy tools to gather millions of accounts with, for people used common passwords, such as "password" or simply their first name, or their firstname1.

There are a few different cracking tiers. For mass bulk cracking you might try the top 5 most common passwords per account before giving up. For deep bulk cracking you might try 20-100 passwords per account. For targeted you try to attempt a list of like 30,000-100,000 passwords and if that fails, you hit up every permutation possible, which is billions and billions. Eventually you hit limits from CPU and network speed, or the target machine, making the attempts per second finite so it can take hours, days, or weeks to crack, depending on what you do.

Advanced systems rate limit various aspects of the authentication protocols but you can get around that with spoofing.

By u$1ng!~ a password like that, you almost certainly guarantee that no one can crack it.

The next threat comes from key loggers and Trojans.

Climbing higher you find data centers and network infrastructure vulnerability.

And the easiest always being, hack the human, not the machine.

Most people seem to get infected with virii by clicking "accept", in some form or another, on web pages or when installing common free software.

I always look for the [x] and if clicking [x] doesn't work, you know something is up. So I hit ctrl-alt-del and end the process in its tracks. You just need to know which process to kill - common sense really. Right click kill. Done.

[x] is important. Cancel buttons can be faked to actually be accept buttons.

When installing stuff, slow done and read the options. Click advanced. Don't just blow through it like an idiot noobie. Install exactly what you want, exactly where you want it, and nothing else. As you dig down the chain of 2nd rate software "additional installations", it becomes murkier and murkier. Some apps install 2 or 3 additional apps.

Yes this is so true!

RSS

"Destroying the New World Order"

TOP CONTENT THIS WEEK

THANK YOU FOR SUPPORTING THE SITE!

mobile page

12160.info/m

12160 Administrators

 

Latest Activity

Doc Vega posted blog posts
yesterday
Doc Vega commented on Doc Vega's blog post Plausible Explanation Behind Recent Cryptid Sightings in the Wild!
"cheeki kea I was wrong Emperor Penguins are big and powerful but still alive but this,  A size…"
yesterday
Doc Vega commented on Doc Vega's blog post Plausible Explanation Behind Recent Cryptid Sightings in the Wild!
"Cheeki kea here's another that they say there have been modern sightings of!  The name of…"
yesterday
Doc Vega commented on Doc Vega's blog post Plausible Explanation Behind Recent Cryptid Sightings in the Wild!
"cheeki kea, did you ever hear of the giant Imperial Penguins? They were about 6 feet tall and could…"
yesterday
Doc Vega commented on Doc Vega's blog post Plausible Explanation Behind Recent Cryptid Sightings in the Wild!
"cheeki kea I do not think these giant two legged birds would need to have a bad attitude as long as…"
yesterday
Olivia Brooks updated their profile
Tuesday
John Miller was featured
Tuesday
tjdavis's 2 blog posts were featured
Tuesday
Zfort Group's blog post was featured
Tuesday
Doc Vega's 6 blog posts were featured
Tuesday
Burbia commented on tjdavis's video
Thumbnail

“What’s His Motive?” - Inside The Mind of George Soros

"Trump calls for George Soros and son to face federal…"
Tuesday
Burbia commented on tjdavis's photo
Tuesday
Profile IconSeeta Sathe and Olivia Brooks joined 12160 Social Network
Tuesday
tjdavis posted a video

Mossad, Terrifying CIA Technology, Blackwater & The Most Secret CIA Unit | John Kiriakou

John Kiriakou served 15 years in the CIA as a Case Officer (Spy) and as CIA's Head of Counterterrorism Operations in Pakistan where he lead the raid that cap...
Monday
tjdavis posted a photo
Monday
tjdavis posted a video

A Critique of the Tavistock Institute - The Mother Of All Conspiracy Theories

An examination of the Tavistock Institute, a theory which seeks to explain how Western societies have been brainwashed by a cabal of social scientists and th...
Sunday
tjdavis posted a video

“What’s His Motive?” - Inside The Mind of George Soros

In this short clip, Patrick Bet-David, Sebastian Gorka Adam Sosnick, and Tom Ellsworth George Soros and what motivates him to do the things he does. FaceTime...
Aug 27
Doc Vega posted blog posts
Aug 27
cheeki kea favorited Bob of the Family Renner's photo
Aug 26
cheeki kea commented on Doc Vega's blog post Plausible Explanation Behind Recent Cryptid Sightings in the Wild!
"If you're ever out there Doc V and notice giant two legged birds roaming the wilderness be…"
Aug 26

© 2025   Created by truth.   Powered by

Badges  |  Report an Issue  |  Terms of Service

content and site copyright 12160.info 2007-2019 - all rights reserved. unless otherwise noted