ZILtoid1991@lemmy.world to 196@lemmy.blahaj.zone · 1 year agoObvious cybersecurity rulelemmy.worldimagemessage-square8linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1imageObvious cybersecurity rulelemmy.worldZILtoid1991@lemmy.world to 196@lemmy.blahaj.zone · 1 year agomessage-square8linkfedilink
minus-squareOrnateLuna@lemmy.blahaj.zonelinkfedilinkarrow-up1·1 year agoBeing a hacker in the early days of computers must have been so fun and accessable
minus-squarescops@reddthat.comlinkfedilinkEnglisharrow-up1·1 year agoLeader: “Alright, while he’s working on breaking into their system, we’ll–” Hacker: “I’m in.” Leader: “That fast? Did you find some zero-day to exploit?” Hacker who just tried username “admin”, password “password”: “Yyyyeeeeeees?”
minus-squareUriel238 [all pronouns]@lemmy.blahaj.zonelinkfedilinkarrow-up1·edit-21 year agoTo this day, database hacks (top 1000 most popular passwords) and reverse hacks (a few popular passwords on a few thousand accounts) still often result in successful penetrations. The weakest security link is between chair and keyboard.
Being a hacker in the early days of computers must have been so fun and accessable
Leader: “Alright, while he’s working on breaking into their system, we’ll–”
Hacker: “I’m in.”
Leader: “That fast? Did you find some zero-day to exploit?”
Hacker who just tried username “admin”, password “password”: “Yyyyeeeeeees?”
To this day, database hacks (top 1000 most popular passwords) and reverse hacks (a few popular passwords on a few thousand accounts) still often result in successful penetrations.
The weakest security link is between chair and keyboard.