• 0 Posts
  • 451 Comments
Joined 1 year ago
cake
Cake day: June 12th, 2023

help-circle
  • Yeesh, I didn’t even know there were consumer grade WiFi transceivers that were strong enough to cover such a massive area. Was it a small farm or just a big property? That had to have been a pretty expensive WiFi system regardless. Did you use Ubiquiti directional access points or something?

    I have a sister that runs a small family farm and she asked my brothers and me (3 of us have IT backgrounds/careers) for viable coverage solutions to their various livestock areas. We settled on just running copper to one barn from her house and broadcasting from there with a few repeaters equipped with trunk channels in order to maintain full duplex.


  • Ackshually, being too close to high power radio frequencies isn’t safe. I remember at one base I was stationed at in Afghanistan, there was a smoke spot we all used to take breaks at. For some reason, I started developing really bad headaches and feeling kind of nauseous. I figured I was just acclimating to the local climate or something. After a few weeks, I was up on our building installing one of our satcom dishes on top of it when I noticed something. Right on the other side of the fence of that smoke area, was a ~2m high powered dish pointing just above above where the smoke area was. I pointed this out to the Norwegians that ran the camp and the break area was promptly moved, lol.

    But seriously, I do not understand the anti-5G nutters.


















  • Well, I’m not a cybersec specialist, but my job requires us to comply with NIST cyber security frameworks, including going through external audits every year. In my opinion, your basic generalities are fine for those not working in that field specifically.

    However, for cyber security analysts and other specialists, I think specific subcategories are necessary. The reason being, IT is an absolutely massive field that contains a ton of specialties. As such, that means there are roughly an equal variety of malicious actors in the same field.

    There’s no such thing really as a general “hacker” anymore. Especially when you take into consideration the rapid expansion of state sponsored cyber attacks/warfare. You’ll have specialists for various types of:

    • phishing (e.g. targeting general pop/employees, or those going for specific people)
    • cryptography (e.g. those who try to compromise an org’s PKI, or people finding vulns to exploit expired certs like what happened with Azure last year)
    • vuln hunters/exploiters (e.g. people that monitor known vulnerabilities and probe orgs’ defenses to see if those vulns are present/unpatched/unmitigated, or even people who try to discover new ones)
    • malware engineers (e.g. fairly self explanatory, but malware is a very broad term and can come in numerous shapes and sizes, like even using infected images on a website to conduct RCE on mobile devices like what happened a year or two ago)

    Sorry, tangent is getting a bit long-winded now. Anyway, tldr; general terms are fine for laymen or non-specialists, but more precise terms are beneficial for experts in that field.