MnRTV Live Show Wed February 5, 2014 @ 730 EST-Hackers Crackers Code breakers and the NSA - How to protect your PC and your Privacy!

This Wednesday on MnRTV we look at  -Hackers Crackers Code breakers and the NSA - How to protect your PC and your Privacy! These days now we have to worry about Hackers Crackers Code breakers and the NSA when we go online and how safe are we. Are there programs that can make our computers safe from Hackers and Crackers. Is there hardware that can actually stop the NSA from spying on us. Do we need white hackers to discover bugs and software holes and also to keep the government from checking to much info on the public and individual.  Join us for this and the news at the beginning of the show! Youtube link will be up 15 min before the show!


 

Views: 269

Reply to This

Replies to This Discussion

Looks interesting Robert .. Will be listening :)

Thank You Susie it will be a great so hopefully we can help many people with computer security and the nsa

Originally, password crackers were fairly easy tools to gather millions of accounts with, for people used common passwords, such as "password" or simply their first name, or their firstname1.

There are a few different cracking tiers. For mass bulk cracking you might try the top 5 most common passwords per account before giving up. For deep bulk cracking you might try 20-100 passwords per account. For targeted you try to attempt a list of like 30,000-100,000 passwords and if that fails, you hit up every permutation possible, which is billions and billions. Eventually you hit limits from CPU and network speed, or the target machine, making the attempts per second finite so it can take hours, days, or weeks to crack, depending on what you do.

Advanced systems rate limit various aspects of the authentication protocols but you can get around that with spoofing.

By u$1ng!~ a password like that, you almost certainly guarantee that no one can crack it.

The next threat comes from key loggers and Trojans.

Climbing higher you find data centers and network infrastructure vulnerability.

And the easiest always being, hack the human, not the machine.

Most people seem to get infected with virii by clicking "accept", in some form or another, on web pages or when installing common free software.

I always look for the [x] and if clicking [x] doesn't work, you know something is up. So I hit ctrl-alt-del and end the process in its tracks. You just need to know which process to kill - common sense really. Right click kill. Done.

[x] is important. Cancel buttons can be faked to actually be accept buttons.

When installing stuff, slow done and read the options. Click advanced. Don't just blow through it like an idiot noobie. Install exactly what you want, exactly where you want it, and nothing else. As you dig down the chain of 2nd rate software "additional installations", it becomes murkier and murkier. Some apps install 2 or 3 additional apps.

Yes this is so true!

RSS

"Destroying the New World Order"

TOP CONTENT THIS WEEK

THANK YOU FOR SUPPORTING THE SITE!

mobile page

12160.info/m

12160 Administrators

 

Latest Activity

Doc Vega posted a blog post

What US Scientist unwittingly helped the Nazis devise the V-2 Missile?

  In the early 1920’s and leading up to World War II German technology outpaces the peace time…See More
14 hours ago
tjdavis favorited Sandy's video
yesterday
tjdavis posted a photo
yesterday
Christopher Walker is now a member of 12160 Social Network
yesterday
tjdavis posted videos
Sunday
Burbia commented on tjdavis's photo
Thumbnail

Reflection

"Let's see if this goes past indictment."
Saturday
Doc Vega commented on Doc Vega's blog post Something Watches From Out there in the Wilderness
"cheeki kea That's very interesting history. So many things about history that go ignored or…"
Saturday
Burbia commented on Burbia's video
Saturday
Burbia posted a video

Programmed To Kill/Satanic Cover-Up Part 433 (The Charlie Kirk Conspiracy Show)

https://www.programmedtokill.net/projects---- DISCLAIMER! ----Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for "fair u...
Saturday
cheeki kea commented on cheeki kea's photo
Thumbnail

American werewolf- 2018

"Yip I've looked again and this is what the creature looks like, even has stripes just like…"
Saturday
cheeki kea commented on cheeki kea's photo
Thumbnail

American werewolf- 2018

"The mystery continues I guess. ( reminds me of something out of the under world )"
Saturday
cheeki kea posted a photo
Saturday
cheeki kea commented on Doc Vega's blog post Something Watches From Out there in the Wilderness
"Another fine story Doc V. I think it's Dogman the werewolf out there roaming around in high…"
Saturday
Doc Vega posted blog posts
Saturday
Doc Vega commented on Doc Vega's blog post What Four UFO Whistle Blowers All Suffered in Common?
"Less Prone Thanks for you comment Buddy! Dabbling in government kept secrets can cost you dearly. I…"
Saturday
Burbia posted a blog post

Sebastion Piñera and 5G

 Sebastion Piñera “The start of the bidding process for the 5G network. Let’s listen to the threats…See More
Saturday
tjdavis posted a photo
Friday
Doc Vega posted a blog post
Thursday
Less Prone left a comment for Tammy
"Welcome"
Thursday
tjdavis posted a video

Mike Benz: DARPA & USAID are Weaponizing Music to Control Human Behavior

Watch every episode ad-free & uncensored on Patreon: https://patreon.com/dannyjonesMike Benz is a former State Department official and current Executive Dire...
Thursday

© 2025   Created by truth.   Powered by

Badges  |  Report an Issue  |  Terms of Service

content and site copyright 12160.info 2007-2019 - all rights reserved. unless otherwise noted