Connect Beyond Love-Connection

Consider following on social media!

Quick note: if you’re viewing this via email, come to the site for better viewing. Enjoy!

person on their cell phone
It’s time to check out what happening on scriptingthewhy.com again.
Photo by Porapak Apichodilok, please support by following @pexel.com

Here’s a scenario, picture yourself sitting at your computer, thirst-scrolling Instagram on your phone, putting off responding back to emails, handling tasks, and receiving those juicy dopamine hits. You know, just another day in the office for you.

While emails are piling up, notifications on your phone and computer are going off, the watercooler farts a water bubble, and your smartwatch is telling you to get up and start moving or you’ll be one step closer to God’s waiting room. I’m not talking about Florida.

During your quest to come upon the perfect thirst pic so you can quickly run to the restroom and get a handle on your developing situation, have you ever stopped to question “how are all of these devices connected?”

You say no? You wouldn’t be alone in that regard; many people just use devices and don’t really give a second thought as to how they work. We just use them and take them for what they are and their purpose in our daily lives.

However, it’s time to answer the question you didn’t ask because well, I’m a scriptwriter and somehow through the powers that be I find this enjoyable to entertain and inform you so without stealing candy from a baby, I bequeath to you the connection between all of the devices we use throughout our daily lives and what would life be like if we didn’t have them.

Which I could tell you right now, if we didn’t have them then you would still be thirst-scrolling, the personals section in the newspaper was Instagram back in the day. I’m not proud of that knowledge.

gentleman by window on his phone
I’m not liking that photo again, that was Eric with an a.
Photo by Andrea Piacquadio, please support by following @pexel.com

Insta-Connections

This connection, what is it called? You may have heard of it in passing or never at all. The term Internet of Things, better known as IoT, broadly means the collective network of connected devices and the technology that facilitates communication between devices and the cloud.

These devices could range from ordinary household objects to sophisticated industrial tools. The phrase is used to describe the ever-expanding network of smart devices used by sometimes not-so-smart people that connect to the internet.

However, devices that you wouldn’t typically expect to connect to the internet, for example, laptops and smartphones are not typically described as IoT devices. Why? Because anything that requires human interaction or control is not considered a part of IoT.

The concept first IoT emerged as a serious proposition in the 1980s – 1990s, which was pretty much a wild time to be alive. The earliest projects included a connected vending machine, but progress was hindered by early chips being cumbersome and objects struggling to communicate with each other effectively. If you have been in a struggling relationship, you have an idea of what this feels like.

I wonder if the vending machines had the same experience they did in Maximum Overdrive, you know, attempting to hand out people’s expiration dates with Pepsi product placement. That symbolism hits way too hard.

woman sat at laptop using a vr headset..
Tom: You know the sensor can in other directions aside from just up and down.
Sarah: I know…it’s just.
Tom: You miss him, don’t you?
Photo by ThisIsEngineering, please support by following @pexel.com

IoT Connecting Us

Z-Daddy, what do we use that is connected to IoT? Again, pending robot uprise experience inbound. Here’s your list of things to look at and jokingly say to yourself “there’s no way that could speed up my expiration”; dishwashers, refrigerators, smart TVs, smartphones, cars and trucks, heating and cooling systems, fitness machines, and trackers are some examples of IoT.

Most of these products you have experienced personally but keep in mind, while your chances of receiving your expiration date by one of these items are low, it’s never zero.

Generally, IoT is most abundant in manufacturing, transportation, and utility organizations, making use of sensors and other IoT moreover, it has also found use cases for organizations within such as water resource monitoring in agriculture, healthcare, infrastructure, and home automation industries, leading some organizations toward digital transformation. Ja (Yes), we’re pretty much one Elon tweet away.

While the idea of IoT has been in existence for a long time, a collection of recent advances in a number of different technologies has made it practical. Access to low-cost, low-power sensor technology, connectivity, cloud computing platforms, machine learning, and analytics. Imagine, all of this taking place while you spend your days thirst-scrolling.  

Enjoy the read so far? Why don’t you consider subscribing so you can keep up to date?

network of devices next to each other
Choose your addiction from the semi, mid, or crippling.
Photo by Pixabay, please support by following @pexel.com

93 and Lonely

Now I can hear you yelling at some of the items listed earlier, saying “THEY TOOK OUR JOBS!” You didn’t know but you were going to give the job away anyway. I would take a self-driving lawn mower than have to go out and mow my lawn in the hot sun any day.

Having my 93-year-old neighbor staring at me from her living room window while I’m all sweaty working, I mean she’s nice and offers a glass of lemonade and cookies, but Z-Daddy can’t be that daddy. Although… she has Medicare and might have a decent life policy so I may be able to make it a short-term situation. Older people need love too, don’t judge.

Now back to sticking it to IoT and not my neighbor, there is a massive market for intelligent electronics, and over the past few years, IoT has become one of the most important technologies of the 21st century. And years ago, we thought conjuring fire was a big deal.

Now that we can connect everyday objects, IoT enables companies to automate processes and reduce labor costs. A quick word to the wise, if your job is simple enough for a computer to do it, you might want to start looking elsewhere for work.

It also cuts down on waste and improves service delivery, making it less expensive to manufacture and deliver goods, as well offer transparency in customer transactions. Again, these are all keywords for you being replaceable if you haven’t caught on by now.

In short, technology is making life great by making things easier, the downside is it’s making us lazier.

several devices on desk
Handling a situation in restroom, be back in five.
Photo by Pixabay, please support by following @pexel.com

Developing Years Behind

Do you want to know if you can hop into the field of IoT and help technology grow? You don’t want to go to school for a four-year degree and live off ramen and depression or have to meet someone in the alleyway to provide something strange for some change.

I have some good news; you don’t have to. Well, you still might have to meet someone in the alleyway if you need the change or a source of inspiration but for the most part, you don’t have to spend your best years trying to get a degree.

There are many jobs to select and since technology is growing like your developing restroom situation mentioned earlier, going to school would actually see you behind instead of ahead. Saw what I did there? You could detour to other avenues of learning like completing online courses or attending meetups, just stay away from people wanting to link up in alleyways.

smiling man wearing glasses while looking at camera
This might not be Tinder but with writing like this, I don’t feel lonely.
Photo by Marcus Aurelius, please support by following @pexel.com

Made it this far and found this to be entertaining? Then a big thanks to you and please show your support by cracking a like, sharing this with whomever, scripting a comment, or plug-in to follow.

Would like to give sincere thanks to current followers and subscribers, your support and actions mean a lot and has a play in the creation of each script.

Do you feel like there’s something I may have missed about the Internet of Things? Script a comment about it below.

The M.S. You Didn’t Know About

Consider following on social media!

Quick note: if you’re viewing this via email, come to the site for better viewing. Enjoy!

I might not be able to magic money into your bank account but subbing to Scriptingthewhy can help keep it there.
Photo by Viniclus Vieira ft, please support by following @pexel.com

Threat actors have been trying to find ways into your wallet and it seems like they might have found the perfect product to do so. It is fairly known that threat actors want what’s in your wallet and they have attempted through numerous means to reap the benefits of your hard labor.

Although this time, they might have found the perfect product to do just that with the dark web market best-seller. We are going to look at what kind of attack this is, who is using it, its functionality and effects upon release, and some ways you could prevent all the precious items in your wallet from mystically disappearing.  

The dark web isn’t as dark as you think, shady business is done in the light too.
Photo by Elti Meshau, please support by following @pexel.com

The Attack

If you are unfamiliar with the dark web, this is the digital underground nightclub for threat actors and others of the like. Here you can link up with like-minded individuals and purchase items anonymously.

Whether it’s legal or not depends on its nature and its intended use. Now with the addition of Mystical Stealer (MS) being the latest malware product on the market, that nightclub just turned up the bass.

No, this isn’t a play on Mac Stealer and it’s more of a problem as you’ll come to find.

I’m cranking up music like rising gas prices.
Photo by Gaby Tenda, please support by following @pexel.com

Who Can It Be Now

While this Digital Underground nightclub is currently popping, hackers are doing the Humpty dance in their victim’s bank accounts. MS is considered to be a malware-as-a-service due to being priced at USD 150 a month with the option of opting for a tri-monthly payment of USD 390. But like with inflation, gas prices, and MSs popularity the creator is looking to raise those price tags. It’s mind-blowing how criminals have a budget in mind for mucking up the budget of others. Never meet your hero kids.

The creator of MS, who still hasn’t been named, is receiving praise for his product. So much so that the creator has opened the floor on forums requesting any suggestions to improve the product. This raises concern because a threat actor is a developing problem but threat actors working together in numbers can be a developing nightmare.

Enjoy the read so far? Why don’t you consider subscribing so you can keep up to date?

Don’t judge a book by its cover, I’m actually monitoring your network and before you ask, no, I don’t get paid enough for this.
Photo by Tima Miroshnichenko, please support by following @pexel.com

The Sinking Feeling

Speaking of developing nightmares, MS can find its way onto many versions of the Windows OS (Operating System). This ranges from Windows XP to 11 and it doesn’t need any dependencies so tracking its whereabouts is difficult.

MS also checks the environment to ensure it’s not in a sandbox—this is an environment that simulates another computer and other OS can be used within the environment, MS checks for this before it begins its infiltration.

It does this by checking the CPUID, the CPUID is what it sounds like when you break it down. CPU is the Central Processing Unit; ID is the Identification so in a nutshell this malware is checking under the hood to see what you’re running baby. It’s a little checking up the skirt action being done here.

Once in, it begins its operation by inserting itself into the memory to avoid detection and begins to make use of system calls for compromising targets. This is done to ensure that no trace is left on the hard disk during the exfiltration process.

After a target is chosen, malware is released for it to encrypt and transmit. The data is transmitted all the while client authentication is never needed. The malware has the bonus of being created without the need to use third-party libraries and has the enhanced functionality to parser from a self-written browser. It’s almost like the Tesla of malware, except it doesn’t crash on auto-drive.

Malware! We know you’re here!
Photo by Faruk Tokluoglu, please support by following @pexel.com

The Prevention

Now, while threat actors need money, we’re sure you do too. There are some ways to help prevent MS from two-stepping its way into your system. Ensuring your antivirus software is up to date as this will be patched regularly to reduce the risk of infection.

For business owners who have employees. providing awareness training for your employees can help lower the risk of systems becoming infected. Incorporating an incident and response plan as part of your playbook will help as this prepares for an “in case” scenario.

Mystical Stealer has already proven to be a threat so treating it lightly may see things go up in thin air and as times are getting harder, it’s clear that no one wants that.

Prisoner: How’d you know I was going to be there?
Guard: We read a few scripts.
Prisoner: Curse that meddling Scriptingthewhy.
Photo by Ron Lach, please support by following @pexel.com

Made it this far and found this to be entertaining? Then a big thanks to you and please show your support by cracking a like, sharing this with whomever, scripting a comment, or plug-in to follow.

Would like to give sincere thanks to current followers and subscribers, your support and actions mean a lot and has a play in the creation of each script.

Do you feel like there is something I may have missed on Mystical Stealer? Script a comment below.

How to View through Keynotes

Consider following on social media!

Quick note: if you’re viewing this via email, come to the site for better viewing. Enjoy!

It’s the first day on the job and there’s a new script! This is going to be the best day ever!
Photo by SHVETS production, please support by following @pexel.com

It’s your first day on the job. You walk in and sit down to mentally prepare yourself for the laundry list of tasks ahead. While seated at your keyboard, you notice there is a camera installed in the corner of the room pointing at you.

Feeling a little unsettled you look back at your computer keyboard and before you begin to type. You get this eerie feeling of something or someone watching you from all devices.

The camera, the webcam, and even the keyboard feels like they’re watching, and you are not too sure if what you are feeling is real. Let me script for you how this may be your reality.

Timmy: Z-Daddy says we’re being watched by the big boss.
Tom: We’re not interesting enough to spy on. He’s just trying to wig us out.
Photo by Fox, please support by following @pexel.com

Local Private Eyes

You understand how the camera and webcam could be the ones watching your every move. At some point or another, it’s been reported in the news, but to spout that your keyboard can be watching as well, now that might be a thing of nonsense.

You could say one is being unreasonably paranoid. Let me introduce you to a device called a “keylogger”. You may have heard it go by other names such as keystroke logger or keygrabber.

Keyloggers are tools used to capture all your interactions with the keyboard. This means everything you type is recorded and stored for later evaluation. This includes all the questionable websites you visited during the duration of your shift. We’re all looking at you nudemidgetcowgirlsfromouterspace.com.

Henry: See, I told you they were visiting Scriptingthewhy during working hours.
Shaw: well, it is a semi-informative site with some humor but you’re right they’re supposed to be working.
Photo by AlphaTradeZone, please support by following @pexel.com

For Good, Bad, and the Dark-net

The use of keyloggers has been used for both good intentions and malicious ones. For good intentions, this involves things like parents installing a keylogger to monitor their child’s screen time. Although I don’t know of any parents doing that nowadays since we’re just happy to not hear them crying about anything. A silent and preoccupied child makes a happy parent.

Another good intention, though questionable, is companies have been known to use keyloggers to monitor employee productivity, as you would have imagined, yes, the overlords may watch you to ensure that you are in fact working. And finally, IT (Information Technology) departments can use keyloggers for troubleshooting problems with a device.

So, with all of these “good intentions” (minus the company part depending on how you look at it), you may be wondering what the bad or malicious ones are. Unauthorized personnel will use keyloggers to, not only be like Sting from the Police watching every move you make but later sell your information on the dark web or hijack your life if they want.

Again, you’re a somebody and that means every person on the dark net doesn’t mind being you. Whether you choose to believe it or not your information has value.

Enjoy the read so far? Why don’t you consider subscribing so you can keep up to date?

Eric: You read the latest script? Nice, big boss wants to see you by the way. Don’t worry bro, your computer is safe with me.
Bob: I don’t think I should just leave it with you like that.
Eric: Nah bro, you can trust me.
Photo by Helena Lopes, please support by following @pexel.com

Connection via Co-worker

So how would something like this work? This is usually done by social engineering but you’re going to be highly disappointed to know that the installation of such a device is as simple as inserting a USB (Universal Serial Bus) thumb drive.

An example of this might be you’re in your office and Eric from accounting comes in to let you know that the big boss wants a word with you, so you head out to the big boss. If for some reason or other, you leave Eric in the office he can then go to your computer, hook up a device to the plugin slot for your keyboard, and connect your keyboard plugin to the keylogger device.

Photo of keygrabber device.
Photo by keelog,@https://www.keelog.com/usb-keylogger/

From there, all the information is ready to be recorded. There are other means outside of using this tactic. The use of web page scripts provides you with an infected link leading you to a malicious website where the software will download to your computer for the keylogger.

Phishing offers the same tactic, but it is delivered to your email instead, this could be where you see an email featuring the classic “click on the link if you want to marry your Russian princess” or prince. Just so you know, Z-Daddy doesn’t judge, love is love.

And finally, unidentified software is downloaded, this may also be known as “drive-by downloading”, again it’s not what you think, computer nerds aren’t driving around firing malicious code from the side of the car as they go by. This occurs when you visit a website like nudemidgetcowgirlsfromouterspace.com and a file is downloaded without your consent.

Sean: Watching out for people is tough.
Amber: Watching over people is tougher, it’s a good thing we have Z-Daddy.
Photo by KoolShooters, please support by following @pexel.com

Watching Overall

Now while keylogging has some good and bad use cases, let’s be honest, no one likes to be watched without their consent. There may be a niche few who don’t mind because they feel as though they have nothing to hide. However, having this knowledge is important in protecting or simply figuring out if “Big Brother” or another interested party is viewing what you do.

A few ways of confirming are; if your browser is operating sluggishly or slower than normal, if there is a lag in keystrokes or cursor movements, or if your cursor disappears randomly during movement.

Physically, you could inspect your plugins by unplugging them and checking if a questionable device is seated in any of the USB slots. For digital or online protection, avoid visiting or downloading software from unknown trusted sources, if you receive an email from Eric with an attachment saying, “Good times are to be had here, click and download for more,” keep a close eye for grammatical or spelling errors and crosscheck with Eric as that may not have been him.

Always keep an understanding that your personal information is extremely valuable to an attacker. If you have massive debt, it’s not a problem, they’ll get you more and if you have no debt, that’s also not a problem, they’ll find you some.

Julia: Ben, since we subscribed and stayed informed, look at how much we’ve avoided.
Photo by Mikhail Nilov, please support by following @pexel.com

Made it this far and found this to be entertaining? Then a big thanks to you and please show your support by cracking a like, scripting a comment, or plug-in to follow.

Would like to give sincere thanks to current followers and subscribers, your support and actions mean a lot and has a play in the creation of each script.

Do you feel like there is something I may have missed with keyloggers? Script a comment below.