Forum Replies Created
-
AuthorPosts
-
April 29, 2010 at 3:01 PM in reply to: OT: Got stopped in RB by a cop today to do an “environmental study” #544959
Doofrat
ParticipantThe official site selection protocol consists of a random number table and a set of dice. Roll em’ right and you’re going to San Diego, roll em’ wrong and it’s Fresno.
April 29, 2010 at 3:01 PM in reply to: OT: Got stopped in RB by a cop today to do an “environmental study” #545073Doofrat
ParticipantThe official site selection protocol consists of a random number table and a set of dice. Roll em’ right and you’re going to San Diego, roll em’ wrong and it’s Fresno.
April 29, 2010 at 3:01 PM in reply to: OT: Got stopped in RB by a cop today to do an “environmental study” #545551Doofrat
ParticipantThe official site selection protocol consists of a random number table and a set of dice. Roll em’ right and you’re going to San Diego, roll em’ wrong and it’s Fresno.
April 29, 2010 at 3:01 PM in reply to: OT: Got stopped in RB by a cop today to do an “environmental study” #545648Doofrat
ParticipantThe official site selection protocol consists of a random number table and a set of dice. Roll em’ right and you’re going to San Diego, roll em’ wrong and it’s Fresno.
April 29, 2010 at 3:01 PM in reply to: OT: Got stopped in RB by a cop today to do an “environmental study” #545920Doofrat
ParticipantThe official site selection protocol consists of a random number table and a set of dice. Roll em’ right and you’re going to San Diego, roll em’ wrong and it’s Fresno.
Doofrat
ParticipantIf you haven’t already heard it, this is great:
Tom Mabe is a guy who would prank telemarketers when they called and record the conversations. He’s got a couple funny ones, but this one is the best:Doofrat
ParticipantIf you haven’t already heard it, this is great:
Tom Mabe is a guy who would prank telemarketers when they called and record the conversations. He’s got a couple funny ones, but this one is the best:Doofrat
ParticipantIf you haven’t already heard it, this is great:
Tom Mabe is a guy who would prank telemarketers when they called and record the conversations. He’s got a couple funny ones, but this one is the best:Doofrat
ParticipantIf you haven’t already heard it, this is great:
Tom Mabe is a guy who would prank telemarketers when they called and record the conversations. He’s got a couple funny ones, but this one is the best:Doofrat
ParticipantIf you haven’t already heard it, this is great:
Tom Mabe is a guy who would prank telemarketers when they called and record the conversations. He’s got a couple funny ones, but this one is the best:Doofrat
ParticipantHe has some great info that people shouldn’t just listen to, they should be doing it (like two step authentication), and I think maybe his scare mongering is used to get peoples’ attention. I don’t see why or how anyone would use a cyber attack against infrastructure when a conventional attack is much more effective.
People should be more scared that there is a key logger on their system logging their every keystroke, or they should be scared that they use the same username and password on their bank account as they use on a blog site. It’s nice to see someone talking about this part of the threat which is very real.Doofrat
ParticipantHe has some great info that people shouldn’t just listen to, they should be doing it (like two step authentication), and I think maybe his scare mongering is used to get peoples’ attention. I don’t see why or how anyone would use a cyber attack against infrastructure when a conventional attack is much more effective.
People should be more scared that there is a key logger on their system logging their every keystroke, or they should be scared that they use the same username and password on their bank account as they use on a blog site. It’s nice to see someone talking about this part of the threat which is very real.Doofrat
ParticipantHe has some great info that people shouldn’t just listen to, they should be doing it (like two step authentication), and I think maybe his scare mongering is used to get peoples’ attention. I don’t see why or how anyone would use a cyber attack against infrastructure when a conventional attack is much more effective.
People should be more scared that there is a key logger on their system logging their every keystroke, or they should be scared that they use the same username and password on their bank account as they use on a blog site. It’s nice to see someone talking about this part of the threat which is very real.Doofrat
ParticipantHe has some great info that people shouldn’t just listen to, they should be doing it (like two step authentication), and I think maybe his scare mongering is used to get peoples’ attention. I don’t see why or how anyone would use a cyber attack against infrastructure when a conventional attack is much more effective.
People should be more scared that there is a key logger on their system logging their every keystroke, or they should be scared that they use the same username and password on their bank account as they use on a blog site. It’s nice to see someone talking about this part of the threat which is very real. -
AuthorPosts
