Servers computers
Cybersecurity for Beginners: Basic Skills
Cybersecurity Skills everyone should have, Cybersecurity 101: This video discusses basic approaches and investigation techniques to avoid scams, malware, ransomware and other cyberthreats. Try the new Malwarebytes for free: https://mwb.link/4ay7nag (sponsor)
Buy the best antivirus: https://thepcsecuritychannel.com/best-antivirus
Join the discussion on Discord: http://discord.tpsc.tech/
Get your business endpoints tested by us: http://tpsc.tech/
Contact us for business: https://thepcsecuritychannel.com/contact .
source
Servers computers
New Home Backup Server (Dell T640 with 18 20TB Disks)
In this video I create a new backup server from a Dell EMC PowerEdge T640 with 18x 20TB Seagate Exos refurbished drives. Also there’s some more ranting about backups in general. But idk, there are chapters so you can skip to whatever. And it’s not technically a server, in that it doesn’t serve files. It’s really more of a client that takes files from other servers and holds onto them. But I call it a backup server because hardware-wise it’s a server. Anywho, that’s the description. It’s probably not optimal for the YouTube algorithm, but hey, I’m not an influencer even though I have a TikTok account that I don’t use.
Update: https://www.youtube.com/watch?v=Secv5P01k2M&t=5195
00:00 Intro
02:08 The Drives
03:30 The Data & Other Backups
05:40 RAID & Data Loss
10:00 IcyDock ExpressCage
13:23 Fan Noise
18:30 Caddies, Trays, or Sleds.. Whatever
28:27 Booting & Array Creation
33:50 Array Build Status and Drive Stats
36:43 OS SSDs and T640 Internals
58:20 Lengthy Conclusion (Backups Rant.. again)
1:10:20 Outro .
source
Servers computers
How to Configure iDRAC9 at Initial Setup of Your Dell PowerEdge Server
For more information on the configuration of an iDRAC 9 please visit our knowledge base: http://www.dell.com/support/article/SLN306877
During the initial startup of your new Dell Server, you have to configure the iDRAC to be able to manage your Dell PowerEdge server remotely. In this video you will learn how to configure the iDRAC9 of your Server for the first time.
The iDRAC 9 is configured with a default IP which you can change during the initial setup.
You can access the iDRAC via a dedicated Network Card or the LAN on Motherboard after it is configured.
🔴 For more helpful tutorials, tips and tricks for Dell EMC Products, subscribe to our channel: http://www.youtube.com/DellEnterpriseSupport?sub_confirmation=1
Want to know more about iDRAC, check out this Playlist:
📺 Find our latest Video here:
📖 You can find our Knowledgebase filled with helpful articles here:
https://dell.to/2mgVTVj
💻 Need help? Contact our Support
Community Forums: http://www.dell.com/community
Twitter: http://www.twitter.com/DellCaresPRO
Facebook: https://www.facebook.com/DellEMCSupport/
Other Contact Options: http://www.dell.com/contact .
source
Servers computers
Now Available in Lenovo ThinkSystem SR645 Rack Servers
Lenovo is excited to deliver AMD EPYC™ processors with AMD 3D V-Cache™ technology in its ThinkSystem SR645 rack servers. These new systems feature expanded L3 cache designed for technical computing workloads—helping customers get new products to market faster than ever before.
Discover more: https://www.amd.com/en/events/epyc
*See claims information in video endnotes.
***
Subscribe: http://bit.ly/Subscribe_to_AMD
Like us on Facebook: http://bit.ly/AMD_on_Facebook
Follow us on Twitter: http://bit.ly/AMD_On_Twitter
Follow us on Twitch: http://Twitch.tv/AMD
Follow us on LinkedIn: http://bit.ly/AMD_on_Linkedin
Follow us on Instagram: http://bit.ly/AMD_on_Instagram
©2022 Advanced Micro Devices, Inc. AMD, the AMD Arrow Logo, and combinations thereof are trademarks of Advanced Micro Devices, Inc. in the United States and other jurisdictions. Other names are for informational purposes only and may be trademarks of their respective owners. .
source
Servers computers
Best Public Bedrock SMP Server to Join!
Best Public Bedrock SMP Server to Join!
Come join this Minecraft Valatic SMP on Java or Bedrock on any device! Join this active server with your friends or by yourself for completely free!
Server IP ➤ play.valatic.net
Bedrock PORT ➤ 19132
SMP Store (HUGE SALE) ➤ https://store.valatic.net
Use code BLUEJAY to save on your purchase! Purchase crate-keys, ranks, and more on the Valatic store.
SMP Discord Server ► https://discord.gg/valatic
To join the Public Minecraft Valatic SMP, watch the ENTIRE VIDEO for the server ip and port. Also, leave all your questions in the comments and I’ll do my best to answer!
The Public Minecraft Valatic SMP is just like the Dream smp and Lifesteal smp and you can join on Minecraft java, bedrock, or pocket edition. You can join anytime for completely free with your friends, or make some on the SMP! The server has an active, growing player base, exciting events, awesome server features, professional staff, and the world map is always expanding so you can explore! You can make friends with other players on the server at the spawn, or smp clubhouse too! There is even a server shop to get awesome items that support the Valatic SMP so it can keep the server running! On the Valatic SMP you can travel to many server locations, build cities, explore land, and even start governments or massive server wars! There are even different game modes on the server like Minecraft Lifesteal SMP, Earth SMP, and One Block! The possibilities on the Public Minecraft Valatic SMP are endless so join now and get started!
If you enjoyed the video then subscribe so I can make more just like it!
This server is a 1.18-1.19.2 Minecraft server and nothing else. Consider Subscribing.
#smp #join #public #java #bedrock #valatic .
source
Servers computers
Computer Security | Types of Computer Security | Cybersecurity Course | Edureka
🔵Edureka Cyber Security Masters Program: https://bit.ly/3pfHHIN
🔥Edureka CompTIA Security+ Certification Training: https://bit.ly/3nxeVRl
This Edureka video gives an introduction to Computer Security and the types of computer security. Also, it teaches you various ways to secure your computer devices. Topics covered in this video includes:
1. What is Computer security?
2. Goals of Computer security
3. What to secure?- Types of computer security
4. Potential losses due to cyber attacks
5. How to secure?
🔵CyberSecurity Certification Training : https://www.edureka.co/cybersecurity-certification-training
Subscribe to our channel to get video updates. Hit the subscribe button above.
————————————-
About Edureka Cyber Security Training
Cybersecurity is the combination of processes, practices, and technologies designed to protect networks, computers, programs, data and information from attack, damage or unauthorized access.
Edureka’s Cybersecurity Certification Course will help you in learning about the basic concepts of Cybersecurity along with the methodologies that must be practiced ensuring information security of an organization. Starting from the Ground level Security Essentials, this course will lead you through Cryptography, Computer Networks & Security, Application Security, Data & Endpoint Security, idAM (Identity & Access Management), Cloud Security, Cyber-Attacks and various security practices for businesses.
————————————————
Why Learn Cyber Security?
Cybersecurity is the gathering of advances that procedures and practices expected to ensure systems, PCs, projects and information from assault, harm or unapproved get to. In a processing setting, security incorporates both cybersecurity and physical security, it is imperative since cyberattackers can without much of a stretch take and obliterate the profoundly grouped data of governments, defense offices and banks for which the results are huge so it is essential to have an appropriate innovation which an avoid digital wrongdoings.
—————————————————
Objectives of Edureka Cyber Security Course
This course is designed to cover a holistic & a wide variety of foundational topics of the cybersecurity domain which will be helpful to lead freshers as well as IT professional having 1 to 2 years of experience, into the next level of choice such as ethical hacking/ audit & compliance / GRC/ Security Architecture and so on
This course focuses mainly on the basics concepts of Cyber Security
In this course, we are going to deal with Ground level security essentials cryptography, computer networks & security, application security, data & endpoint security, idAM (identity & access management), cloud security, cyber-attacks and various security practices for businesses
This course will be your first step towards learning Cyber Security
————————————–
Who Should go for this Training?
Anyone having the zeal to learn innovative technologies can take up this course. Especially, students and professionals aspiring to make a career in the Cybersecurity technology. However, Cybersecurity Certification Course is best suited for the below mentioned profiles:-
Networking Professionals
Linux Administrators
———————————————–
For more information, Please write back to us at sales@edureka.co or call us at IND: 9606058406 / US: 18338555775 (toll free).
Instagram: https://www.instagram.com/edureka_learning/
Facebook: https://www.facebook.com/edurekaIN/
Twitter: https://twitter.com/edurekain
LinkedIn: https://www.linkedin.com/company/edureka .
source
Servers computers
The Man Who Revolutionized Computer Science With Math
Leslie Lamport revolutionized how computers talk to each other. The Turing Award-winning computer scientist pioneered the field of distributed systems, where multiple components on different networks coordinate to achieve a common objective. (Internet searches, cloud computing and artificial intelligence all involve orchestrating legions of powerful computing machines to work together.) In the early 1980s, Lamport also created LaTeX, a document preparation system that provides sophisticated ways to typeset complex formulas and format scientific documents. In 1989, Lamport invented Paxos, a “consensus algorithm” that allows multiple computers to execute complex tasks; without it, modern computing could not exist. He’s also brought more attention to a handful of problems, giving them distinctive names like the bakery algorithm and the Byzantine Generals Problem. Lamport’s work since the 1990s has focused on “formal verification,” the use of mathematical proofs to verify the correctness of software and hardware systems. Notably, he created a “specification language” called TLA+ (for Temporal Logic of Actions), which employs the precise language of mathematics to prevent bugs and avoid design flaws.
Read more at Quanta Magazine: https://www.quantamagazine.org/bringing-mathematical-perfection-to-software-20220516/
– VISIT our Website: https://www.quantamagazine.org
– LIKE us on Facebook: https://www.facebook.com/QuantaNews
– FOLLOW us Twitter: https://twitter.com/QuantaMagazine
Quanta Magazine is an editorially independent publication supported by the Simons Foundation https://www.simonsfoundation.org/
#computerscience #math .
source
-
Science & Environment4 weeks ago
Hyperelastic gel is one of the stretchiest materials known to science
-
Technology4 weeks ago
Would-be reality TV contestants ‘not looking real’
-
Science & Environment4 weeks ago
How to unsnarl a tangle of threads, according to physics
-
Science & Environment4 weeks ago
‘Running of the bulls’ festival crowds move like charged particles
-
Science & Environment4 weeks ago
Maxwell’s demon charges quantum batteries inside of a quantum computer
-
Technology3 weeks ago
Is sharing your smartphone PIN part of a healthy relationship?
-
Science & Environment4 weeks ago
Liquid crystals could improve quantum communication devices
-
Science & Environment4 weeks ago
Quantum ‘supersolid’ matter stirred using magnets
-
Womens Workouts3 weeks ago
3 Day Full Body Women’s Dumbbell Only Workout
-
Science & Environment3 weeks ago
X-rays reveal half-billion-year-old insect ancestor
-
Science & Environment4 weeks ago
Why this is a golden age for life to thrive across the universe
-
Science & Environment4 weeks ago
Sunlight-trapping device can generate temperatures over 1000°C
-
Science & Environment4 weeks ago
Quantum forces used to automatically assemble tiny device
-
Science & Environment4 weeks ago
ITER: Is the world’s biggest fusion experiment dead after new delay to 2035?
-
Science & Environment4 weeks ago
Nerve fibres in the brain could generate quantum entanglement
-
Science & Environment4 weeks ago
How to wrap your mind around the real multiverse
-
News1 month ago
the pick of new debut fiction
-
Science & Environment4 weeks ago
A slight curve helps rocks make the biggest splash
-
News4 weeks ago
Our millionaire neighbour blocks us from using public footpath & screams at us in street.. it’s like living in a WARZONE – WordupNews
-
Science & Environment4 weeks ago
Laser helps turn an electron into a coil of mass and charge
-
Science & Environment4 weeks ago
Time travel sci-fi novel is a rip-roaringly good thought experiment
-
Science & Environment4 weeks ago
Nuclear fusion experiment overcomes two key operating hurdles
-
Science & Environment4 weeks ago
Physicists are grappling with their own reproducibility crisis
-
News1 month ago
▶️ Hamas in the West Bank: Rising Support and Deadly Attacks You Might Not Know About
-
News4 weeks ago
▶️ Media Bias: How They Spin Attack on Hezbollah and Ignore the Reality
-
News4 weeks ago
You’re a Hypocrite, And So Am I
-
Business3 weeks ago
Eurosceptic Andrej Babiš eyes return to power in Czech Republic
-
Sport4 weeks ago
Joshua vs Dubois: Chris Eubank Jr says ‘AJ’ could beat Tyson Fury and any other heavyweight in the world
-
Science & Environment4 weeks ago
A new kind of experiment at the Large Hadron Collider could unravel quantum reality
-
Technology3 weeks ago
Why Machines Learn: A clever primer makes sense of what makes AI possible
-
Science & Environment4 weeks ago
Caroline Ellison aims to duck prison sentence for role in FTX collapse
-
News1 month ago
New investigation ordered into ‘doorstep murder’ of Alistair Wilson
-
Science & Environment4 weeks ago
Rethinking space and time could let us do away with dark matter
-
Technology3 weeks ago
Quantum computers may work better when they ignore causality
-
Sport3 weeks ago
Watch UFC star deliver ‘one of the most brutal knockouts ever’ that left opponent laid spark out on the canvas
-
Science & Environment4 weeks ago
A tale of two mysteries: ghostly neutrinos and the proton decay puzzle
-
News4 weeks ago
The Project Censored Newsletter – May 2024
-
Technology3 weeks ago
Robo-tuna reveals how foldable fins help the speedy fish manoeuvre
-
Business3 weeks ago
Should London’s tax exiles head for Spain, Italy . . . or Wales?
-
MMA3 weeks ago
Conor McGregor challenges ‘woeful’ Belal Muhammad, tells Ilia Topuria it’s ‘on sight’
-
Football3 weeks ago
Football Focus: Martin Keown on Liverpool’s Alisson Becker
-
Technology2 weeks ago
Microphone made of atom-thick graphene could be used in smartphones
-
Business2 weeks ago
When to tip and when not to tip
-
Sport2 weeks ago
Wales fall to second loss of WXV against Italy
-
Health & fitness4 weeks ago
The secret to a six pack – and how to keep your washboard abs in 2022
-
Technology3 weeks ago
‘From a toaster to a server’: UK startup promises 5x ‘speed up without changing a line of code’ as it plans to take on Nvidia, AMD in the generative AI battlefield
-
Technology3 weeks ago
University examiners fail to spot ChatGPT answers in real-world test
-
Science & Environment4 weeks ago
Physicists have worked out how to melt any material
-
News4 weeks ago
Israel strikes Lebanese targets as Hizbollah chief warns of ‘red lines’ crossed
-
Science & Environment4 weeks ago
Future of fusion: How the UK’s JET reactor paved the way for ITER
-
Technology2 weeks ago
This AI video generator can melt, crush, blow up, or turn anything into cake
-
Business2 weeks ago
Ukraine faces its darkest hour
-
Politics3 weeks ago
Robert Jenrick vows to cut aid to countries that do not take back refused asylum seekers | Robert Jenrick
-
Science & Environment4 weeks ago
Being in two places at once could make a quantum battery charge faster
-
Technology4 weeks ago
The ‘superfood’ taking over fields in northern India
-
Science & Environment4 weeks ago
UK spurns European invitation to join ITER nuclear fusion project
-
CryptoCurrency4 weeks ago
Cardano founder to meet Argentina president Javier Milei
-
Politics4 weeks ago
UK consumer confidence falls sharply amid fears of ‘painful’ budget | Economics
-
TV3 weeks ago
CNN TÜRK – 🔴 Canlı Yayın ᴴᴰ – Canlı TV izle
-
News3 weeks ago
Why Is Everyone Excited About These Smart Insoles?
-
Womens Workouts3 weeks ago
3 Day Full Body Toning Workout for Women
-
Technology3 weeks ago
Get ready for Meta Connect
-
Sport4 weeks ago
UFC Edmonton fight card revealed, including Brandon Moreno vs. Amir Albazi headliner
-
News1 month ago
How FedEx CEO Raj Subramaniam Is Adapting to a Post-Pandemic Economy
-
Science & Environment4 weeks ago
Why we need to invoke philosophy to judge bizarre concepts in science
-
Business4 weeks ago
Thames Water seeks extension on debt terms to avoid renationalisation
-
Politics4 weeks ago
‘Appalling’ rows over Sue Gray must stop, senior ministers say | Sue Gray
-
Science & Environment3 weeks ago
Meet the world's first female male model | 7.30
-
Health & fitness3 weeks ago
The 7 lifestyle habits you can stop now for a slimmer face by next week
-
Business2 weeks ago
DoJ accuses Donald Trump of ‘private criminal effort’ to overturn 2020 election
-
Entertainment1 week ago
Christopher Ciccone, artist and Madonna’s younger brother, dies at 63
-
Technology2 weeks ago
Ukraine is using AI to manage the removal of Russian landmines
-
Business2 weeks ago
Bank of England warns of ‘future stress’ from hedge fund bets against US Treasuries
-
TV2 weeks ago
Phillip Schofield accidentally sets his camp on FIRE after using emergency radio to Channel 5 crew
-
Technology2 weeks ago
Amazon’s Ring just doubled the price of its alarm monitoring service for grandfathered customers
-
News2 weeks ago
Heartbreaking end to search as body of influencer, 27, found after yacht party shipwreck on ‘Devil’s Throat’ coastline
-
Politics4 weeks ago
Trump says he will meet with Indian Prime Minister Narendra Modi next week
-
CryptoCurrency4 weeks ago
Ethereum is a 'contrarian bet' into 2025, says Bitwise exec
-
Health & fitness4 weeks ago
The maps that could hold the secret to curing cancer
-
Science & Environment4 weeks ago
Most accurate clock ever can tick for 40 billion years without error
-
CryptoCurrency4 weeks ago
Decentraland X account hacked, phishing scam targets MANA airdrop
-
CryptoCurrency4 weeks ago
Bitcoin miners steamrolled after electricity thefts, exchange ‘closure’ scam: Asia Express
-
CryptoCurrency4 weeks ago
DZ Bank partners with Boerse Stuttgart for crypto trading
-
CryptoCurrency4 weeks ago
Low users, sex predators kill Korean metaverses, 3AC sues Terra: Asia Express
-
CryptoCurrency4 weeks ago
Blockdaemon mulls 2026 IPO: Report
-
MMA4 weeks ago
Rankings Show: Is Umar Nurmagomedov a lock to become UFC champion?
-
Womens Workouts4 weeks ago
Best Exercises if You Want to Build a Great Physique
-
Womens Workouts4 weeks ago
Everything a Beginner Needs to Know About Squatting
-
News3 weeks ago
Four dead & 18 injured in horror mass shooting with victims ‘caught in crossfire’ as cops hunt multiple gunmen
-
Servers computers3 weeks ago
What are the benefits of Blade servers compared to rack servers?
-
News4 weeks ago
Church same-sex split affecting bishop appointments
-
Technology4 weeks ago
iPhone 15 Pro Max Camera Review: Depth and Reach
-
News4 weeks ago
Brian Tyree Henry on voicing young Megatron, his love for villain roles
-
Business4 weeks ago
JPMorgan in talks to take over Apple credit card from Goldman Sachs
-
Science & Environment4 weeks ago
Quantum time travel: The experiment to ‘send a particle into the past’
-
Science & Environment4 weeks ago
Tiny magnet could help measure gravity on the quantum scale
-
Science & Environment4 weeks ago
How do you recycle a nuclear fusion reactor? We’re about to find out
-
CryptoCurrency4 weeks ago
Dorsey’s ‘marketplace of algorithms’ could fix social media… so why hasn’t it?
-
CryptoCurrency4 weeks ago
Bitcoin bulls target $64K BTC price hurdle as US stocks eye new record
-
News4 weeks ago
Brian Tyree Henry on voicing young Megatron, his love for villain roles
@person28377
October 15, 2024 at 5:52 am
first thing on the list should be syncing your audio and video properly
@ActualWonton
October 15, 2024 at 5:52 am
Can someone elaborate a little further on 3:48 where the application is suspected to be a trojan? Is it because it established a connection while showing no UI? Just wanna make sure I understand it because if I were to install TCPView I think I would get confused about what would be considered suspicious behavior between other applications that were already running.
@khaledshokry9223
October 15, 2024 at 5:52 am
Scamadvisor looks like a scam website
@radheyakhade9853
October 15, 2024 at 5:52 am
So I wanted to know about this ThreatFox abuse …..the database in it …does it contain the iocs i have visited or …….the iocs that have been faced by large amount of users
@cchits
October 15, 2024 at 5:52 am
Stay informed and stay ahead in the ever-changing world of cybercrime. Traditional educational institutions may not provide the cutting-edge knowledge needed to navigate this rapidly evolving landscape. To stay protected, you will need to be proactive in your approach to cybersecurity.
This requires continuously educating yourself on the latest threats, vulnerabilities, and mitigation strategies. Relying solely on what is taught in a classroom setting is no longer sufficient.
The onus is on individual users and businesses to take ownership of their cybersecurity posture. This means actively seeking out the most up-to-date information, tools, and best practices to safeguard against ever-morphing cyber threats.
By adopting a proactive mindset, you can position yourself and your organization to be more resilient and responsive in the face of emerging cybercrime trends. The alternative – falling behind the curve – can have severe consequences in today's hyperconnected, digital-first world.
Stay vigilant, stay informed, and stay ahead of the curve. Your cybersecurity future depends on it.
@Abacoot
October 15, 2024 at 5:52 am
I can't tell if this is a troll video or not.. you visit a fishy website that likely could have strong malware (without a virtual machine), you use simple scam advisors.. and you DOWNLOAD..download a malware file onto your desktop.. without an automatic scan that easily could of auto exec'd on your PC?
If this is entry level cyber security I'm very very afraid for beginners..
@sureyoucan1613
October 15, 2024 at 5:52 am
Man, thanks for this video.
@nirajshetty6640
October 15, 2024 at 5:52 am
Which is the web browser that is used in this video
@alucard6825
October 15, 2024 at 5:52 am
the game on 1:51 is Therapy with Dr. Albert Krueger by dino999z whos games i love dearly. it is sad to see the game faked for malware 🙁 great developer totally recommend the game.
@limurudocumentscentre
October 15, 2024 at 5:52 am
wow thats why i love this channel can you pin your whatsapp number please😇
@Johnny-re7dm
October 15, 2024 at 5:52 am
im curious: does any of these showcased tools to detect viruses detect a virus that can hide itself in bios or other firmware?
@gemox3225
October 15, 2024 at 5:52 am
Thank you very much. I'm an absolute beginner, so I do not wish to comment further. I just appreciate the help.
@Il_panda
October 15, 2024 at 5:52 am
I started learning re just because of this
@DailyCyberSecurity
October 15, 2024 at 5:52 am
Thanks for the video❤
@Archmage9885
October 15, 2024 at 5:52 am
So Microsoft owns the company that developed Sysinternals, right? Why didn't they make the tools a basic part of Windows?
@alimirqasimov3033
October 15, 2024 at 5:52 am
Hello I love your channel and I wanted to know if sysinternals suite is safe. Thank you
@crucific07
October 15, 2024 at 5:52 am
Thanks man, I'm looking into choosing Network Operation and Cyber Security as my major and I wanna research it all.
@antoniusxxo5687
October 15, 2024 at 5:52 am
What's the difference between the system suite and normal task manager?
@dslam22
October 15, 2024 at 5:52 am
can you do a vpn breakdown
@Mujoujinsoku
October 15, 2024 at 5:52 am
Why does pestudio come up as suspicious on Hybrid Analysis?
@miikatenkula6356
October 15, 2024 at 5:52 am
Thank you for the tips. One thing I want to add, Malwarebytes gave a red flag to my legit copy of God of War, bought from Steam. That was my first time using it. It gave clear to my whole system but God of War.exe was red flagged. Uninstalled.
@rexaca1826
October 15, 2024 at 5:52 am
Thanks for sharing knowledge mate.
@kezza3019
October 15, 2024 at 5:52 am
Does anyone know if Malwarebytes will clash with other AV's? I have F-secure but I do like how affective Malwarebytes is.
@EricWegelin
October 15, 2024 at 5:52 am
Uns virustotal
@Velereonics
October 15, 2024 at 5:52 am
PlanetsTherapy as a name has that asian scammy quality to it that would set off mental alarms for me. Like at this point I can detect dropship brands on Amazon just by the name.
@tumato5564
October 15, 2024 at 5:52 am
I am a freshmen in college going into cyber security. I have seen videos talking about the importance of getting an internship freshmen year but I am just starting out and wondering if it would be better to build up my skills or look for internship opportunity.
@tomato.mp4
October 15, 2024 at 5:52 am
I dont know if you will see this but lemme tell you getting hacked is easier then expected happened to me a few months ago via social engineering in minecraft it was late at night i was so bored and was looking for a teammate someone offered i accepted and soon he told me to join a discord server for vc in the server there was a verification bot and i inputted my username not password then i get a microsoft auth notification and in a haze i just accept it 💥 hacked luckily i was able to recover it and i thought i was smart 😅
@Mrbbassi
October 15, 2024 at 5:52 am
i think using sandbox could be more secure for such things!
@TodMeiss-j6b
October 15, 2024 at 5:52 am
Balistreri Meadow
@Triny-i5t
October 15, 2024 at 5:52 am
thanks for providing the malware bytes link. Also thank you to the malware bytes team for the free download
@MISTYEYED.
October 15, 2024 at 5:52 am
❤
@Techbits-pr6hy
October 15, 2024 at 5:52 am
Now a days anyone can use cloud services to attack with valid SSL certificate
@bassamel-ashkar4005
October 15, 2024 at 5:52 am
your process explore looks much prettier and understandable. i just downloaded mine and its no where as organized as yours. How to make it look like yours, like to show all the process in a list, also virus total, i couldn't find it at all inside the options.
@BoothTheGrey
October 15, 2024 at 5:52 am
This is clearly not for beginners. I am Web Supporter for small business customers and we have thousands of companies where real beginners sit as accountants in front of PCs. Those are beginners.
Probably you mean "security beginners" which means they should already have rather well PC knowledge. You should have mentioned it in the beginning of the video and in the description.
This is by the way the most biggest problem with too many IT folks. They are completely incapable of understand what it means to be a "beginner" or someone who is struggling with PC systems. Which is million over million people.
Maybe I check out other videos from this channel. But please… think a bit more about who it is you wanna adress and target. I repeat: This is not a video for "beginners".
@joshgloballlc3500
October 15, 2024 at 5:52 am
https://youtu.be/3zfH5aJBAts?si=VkAiQJg6SU37gBa9
@James-ff5yq
October 15, 2024 at 5:52 am
Thanks
@CatharineSusie
October 15, 2024 at 5:52 am
7508 Hodkiewicz Valleys
@francishubertovasquez2139
October 15, 2024 at 5:52 am
Does the machine and the heart have interactive understanding or misunderstanding categorically, Theres the SA and AV like the brain neurons, why verdict, for money making circus, I think I dont need that Abaddon type thing, I need a lunch for the launch for 2, thing. Yknow modern Space tourism with the front desk attract.
@soskom
October 15, 2024 at 5:52 am
I need advance skills video🙏🏻 Let’s stop all malware
@mousepotatoliteratureclub
October 15, 2024 at 5:52 am
0:40
Me, who already knows the real name of this game is Therapy with Dr. Albert Krueger: