@@DoubleUSlade Heh, really? It's simply not for other people to force you to use your computer that you paid for in a certain way. If you were using your computer to present an important meeting or to treat a busy waiting room full of anxious patients, it's grossly inappropriate to sit there waiting for 10 minutes for something that won't help your situation.
True, lol. But it's not just Microsoft, pretty much across all software industries, companies are diligently working to erase the concept of ownership. They want you to pay for their products but at the same time they also want to keep total control over those products and reduce your ability to make decisions on your own down to an absolute minimum. Of course all while gathering every little scrap of data they can possibly get their hands on, stasi-like. (If you don't know what stasi is, it was basically the secret police/government agency in soviet occupied germany, which was tasked with, amongst other things, extensive surveillence and monitoring of the population)
one thing to note about jack's commentary, is that he is talking from the perspective of a "novice" character, not himself, then occasionally breaks character and shows a fraction of his true knowledge before returning to both the character and neutral recap. he obviously knows more than what he lets on but obfuscates that for storytelling purposes. that is what makes the podcast so engaging.
I love your podcast. You've taken the rabbit hole, shone a light down it and "See I told you it's not that deep and it's also pretty cool .And it's not a rabbit hole at all, but the foundation of our modern world" and I love that.
New to this channel. Not computer savvy but mind blown none the less. I learn something new every few minutes watching these. I binge watched for a few hours last night. Subbed!
A facility i lived in had a system full of (my) PII vulnerable to ms08-067 in 2021 and they refused to update it. This thing was used exclusively for email and printing documents. I fired up wannacry in a VM to force their hand. they asked me what i did. I said “you left a your computer vulnerable to an exploit that was patched in 2008 and a worm infected one of my test machines. They replaced that anemic XP machine straight out of 2012 with something running windows 10.
I'm not gonna lie, this was my favorite vulnerability to exploit when it was new. I'm happy to hear a story about it from the Microsoft's side. It was juicy!
They're a multi -platform billion dollar company. Considering the billions of devices, making the source code open at this point would be akin to wreckless abandon. It sucks, but it is what it is
Haven't there been a few decades old security vulnerabilities found in the Linux kernel in recent history? Not saying open source is useless but it doesn't make complex software immune to bugs
@Carnivore Bear but it does make it possible for the community to fix bugs faster potentially. Obviously Microsoft has money to pay people to do for their code. But the argument remains.
Back then my dad recieved mails form our ISP that or network is sending malicious packages but he ignored it since it lkooked like spam. But when we got a letter from our ISP that we had to fix the issue our our internet contract would be terminated he bought virus scanners and they found conficker on our devices. I recently plugged in an old USB device and windows instantly warned me that conficker is on there.
Hey bro I thought you were taking a vacation? I was really excited to listen to this last night but how come your not taking the break? It’s well deserved and we will still be here give yourself some you time. Love your work btw you have very quickly became my fav channel. I’m rewatching from the beginning now. Thanks for all your hard work!
I think he may still be taking a break, but has scheduled uploads of which he already made a podcast episode. It’s new to RU-vid, but he originally shared it January 21, 2020, on his podcast ☺️
Gret episode Jack As somebody who's team has to try and patch thousands of end point when this stuff happens, I can relate to much of it, great work by M$ behind the scenes to get patches out
I love what he said about his job at MS, to improve public trust by hardening the operating system. Not a job so many companies now have in marketing, by spinning the bad news, or by deflecting the blame to some other company, or by blaming the right to repair movement.
Your question at 39 minutes is valid in more scopes. A user who finds and discloses to a company that doesn’t respond raises those same concerns… but the person disclosing has no control over the outcome… so if the vendor decides not to fix… or doesn’t fix it well. That decision to disclose can impact the user disclosing their findings
I have a question for the experts: Is it possible for 4 guys with no electronics devices but sheets of papers and pencils to analyze a 17 million lines code, in 5 days, that runs a multiple choice machine?..Would they be able to find something in the code that favors one choice more than the others?.... this scenario happened in real life about 2 months ago.
5:50 AH HA! The good ole days. Heard people are still using even older OSes. I still remember the upgraded R2 version of XP. 9:00 And oh yes, I remember Dr. Watson. We went all the way back to the 2006. 😃 Not going 2 tell you about that obvious ad banner🚫 that was running back then.🤫 58:07-58:13 L🖤🤍ve that outro.😆
I hate podcasts generally, but your stuff is so good! How do you make your editing decisions, like the random percussive sounds during the intense parts?
Wow, this episode of Darknet Diaries is mind-blowing! The story of how Microsoft discovered and dealt with the Conficker Worm is incredibly interesting, and I couldn't stop listening. Keep up the great work, Jack! Highly recommended to anyone interested in computer security.
Windows has been compromised ever since 98SE. Permanently opened ports giving access whenever there is an internet connection. Remote connections are not needed to be enabled internally, and there's no extra install necessary. The specific routines cannot be discovered via manually searching due to the exposure being given an exemption from being displayed.
I totally agree with holding the individual accountable for most of their safety practices. However, it is this absurdity of marketing on behalf of Big Technology that leads to people paying an inordinate amount of money to protect themselves. It's also simple enough to justify that the individual and not the collective corporations are left to figure out what is the best solution for their online security. This makes sense up to the point that most people don't have even novice level understanding of what they need. If you aren't using TOR with a VPN and browser tracking blocking. Then you are under surveillance. Sometimes at every level of the TCP/IP model. Just saying... Great job, great channel and great work! Thank you.
@@ImadZeryouh Yep, both WinRAR and 7zip still can show hidden files even if the system is infected, Last, you are first one to say about my methods creative. Because (Almost 20 yrs ago) I applied for IT jobs on ( _Europeans companies_ ) and the only company replied, told me we don't need your methods, I should learn more hacking methods instead when I was still young, and make my living of it, I know now why these hackers developed all that nasty tools, simply because nobody actually cares.
John Lambert just confirmed what I've always said : "You are a beta tester for M$FT if you use their new OS in it's first 3 years." Let the sheep test it......
I try not to break the law in order to help people with their own property. Not sure how I haven't been "talked to" but any real hacker could see I'm just trying to help people.
One thing's quickly become evident around 14 minutes in: sidelining, trivializing, discounting bugs because "they aren't security problems" shows scant disregard for their paying customers. Yes, it's a complex coddled-together chunk of software with millions of moving parts but it suggests to me that there are systemic problems with the design and that a really hard re-evaluation of how such projects are built would have been in order. I think that Millenium or whatever it was called should never have hit the shelves. I spent a morning at a friend's place manually having to get bootloading-bits sorted (I forget the exact details) just to get the thing to boot. And it was lucky I knew which files were involved. Having said all that, a pox on the hacker/s who do their best to ruin the lives of people including the company that is trying to put a piece of software out there to make lives easier for people who want to use what amounts to a pile of transistors.
The intro explains perfectly the concept behind hijap in Islam, that women and men should wear modestly and cover their "attractive" parts. Just like men should lower their gaze
Thank you Jack I have learned so much for watching just a couple of your videos and they totally make sense I was hacked a couple months ago they tried to take out money out of my account but it didn't work cuz I'm broke but thank you
If a researcher discloses a vulnerability and Microsoft spends more than a year not fixing it, we might know why. Fixing the bug may cause more harm to more computers and more companies. So just let the bug live for a while with more likely minimal damage. Microsoft then can sell the exploit to the NSA.
They get a billion error reports a week.. remember the first time you got one and submitted it like they were going to reach back out to you and help? 😂
I have a work computer that still runs windows 95 lol.. Its just hooked up to a lable printer, but I guarantee this dinosaur has not been updated. I don't know if it's ever been hooked up to the internet.
How can patching this vulnerability cause applications to stop working? Presumably the fix affects that service's code only and adds error checking for RPC packets, and would not affect anything _other_ than what happens when malformed packets are received. So why does installing that patch make other code stop working, such that you have to wait for each vendor to update their code first?
I have two computers one is my gaming rig and the other is a gaming rig I haven't done anything with it just has a fresh copy of windows. Is it legal to hack my own computer to teach my self the trade? My goal is to get into infosec
yes running on virtual machines might be worth considering.. also not sure if ur isp would be too happy.. good hunting to ya kali linux has a plethora of tools for just what ur after
My computer was infected with this or something similar when I was young I was able to fix it by stopping svchost and then doing a fresh install of windows I was pretty young at the time brought the memory back to me as I listened to this
I ditched proprietary trash long ago, I am not a zealot but still listening to this gives me bad vibes, mesianic saviors from M$ and their struggle to save our souls, where are we now, apple, android, ppl are terrible and do not deserve nice things, let it all burn.
@@nge400 Wow, sounds so great that the civil engineers can make that happen. One city in Germany has a road with a speed limit of 80, then 50, then 130 for 100m, and then 50, and the guy that pushed for those 130km/h speed limit, which was that whole street's formed speed limit, isn't even driving on it to work. How many civil engineers were needed to make that happen?
What are the most accurate "hacking" movies out there? Been searching around a bit and I just realized that this is probably one of the best communities for this question.
It would be well deserved. But that being said I was very pleasantly surprised to see this episode pop up! He should take a bit of time for himself tho at least a couple weeks. We will still be here waiting his content is worth it.
Keeping your apps and system updated is a very good way to stay protected on the internet, but let's be honest here, not the best. If you want to have a safe browsing experience, make sure to get finger cots.
Might it be possible, that the vulnerabilities are intentional. Without transparency there is potential for nefarious behaviour behind the veils of secrecy.