DD Came Stopped to Party

Quick note: if you’re viewing this via email, come to the site for better viewing. Enjoy!

people dancing a nightclub.
Which one of you spiked my drink!? I can taste my heartrate!
Photo by Mauricio Mascaro, please support by following @pexel.com

This might send you back to those feel-good party nights so prepare to reminisce and say…” No, I don’t recall that happening.” Have you ever been to a nightclub, found someone to party with, and decided that you would like to spend most of your time with them?

You both are having a really good time, the music is pumping, the people around you are jamming, and something to you smells funny but that’s okay because the pills you took five minutes ago bestowed upon you the ability to see and taste sound.

You have to take a quick break and hit the restroom, only to come back and find your chosen dance partner is oddly being blocked by a crowd of people and no matter how much you try, you just can’t seem to get within reach of them. Have you never had this happen?

Okay, so apparently Z-Daddy is the only one who has had weird times in nightclubs huh? While you are lucky enough to say you haven’t experienced this event, this often happens with computers and companies you favor. What is this go-go nonsense I’m yammering on about? This will all make sense in a moment.

large group of people walking on road.
She’s leaving with you, but she was programming with me bro. Oh wait, that’s not right.
Photo by Vlad Alexandru Popa, please support by following @pexel.com

Clubbing in Denial

What is this weird phenomenon taking place in this nightclub which often happens to a computer or network? To put it in simple terms, you’re symbolically being hit with a “denial-of-service” or DoS.

This is a form of cyber-attack where the attacker seeks to make either your machine or a network resource unavailable for intended users. Distributed Denial of Service or DDoS occurs when a mass of machines operates together to focus an attack on one target to disrupt the normal traffic of the targeted IP address.

Picture if you can, five lanes of traffic trying to fit down a one-way street. This leads to the target’s device being overwhelmed and denying legitimate users access to the desired website. In fact, one of the largest attacks on record was at GitHub, a popular online code management platform that is used by a lot of developers. They were hit with a large volume of traffic that led to the disruption of their site. Click here to find out more details. What are some other things that can suffer from an attack like this I can hear you ask.

Aside from personal computers, cell phones, public cloud services, and IoT (Internet of Things) devices that aren’t tightly secured are not off the menu, they can all suffer a DDoS attack. Depending on how bad the attack is can play into how long it takes for your site to become available.

In some cases, could be as little as 24hrs and in others can be from days to a week given how quick the response time is. Variety is the spice of life and by choosing which device to overload, you can find plenty of it.  

young woman sat at computer screen in shock.
I can’t get to access my Grub Hub account…that means I have to cook tonight.
Photo by Andrea Piacquadio, please support by following @pexel.com

Dirty, Dirty, Dirty Tactics

Who and why would someone turn to use such a tactic? Trying to hinder or take out the rival competition is one reason. If customers can’t get to your competitors’ sites but find access to yours. Then it makes the choice that much easier for them to buy from you.

This is pretty much a “Two birds with one stone” situation because not only are you carrying out a hit on your competition, but you are also passively strong-arming your potential customers into buying from you.

That’s operating like a boss. Another reason someone might perform a DDoS is Hacktivism, meaning they don’t agree with something political and promote an agenda of their own by hacking. In the days before the pop-ups of “How-to”, you had to be skilled to perform such an attack but now, like with malware, you can simply go to the dark side and pick something up extra saucy if you have enough coin.

Again, your presence on the dark web is not illegal but the activity you choose to engage in begs the question. Remember to always stay legal kids.

young gentleman rushing to woman in red over coat.
Bob: Karen, I thought you were leaving him for me.
Tim: she’s with me buddy. Your access just got denied.
Photo by Two Shores, please support by following @pexel.com

Last Minute Halts

So why is knowing about a DDoS important? DDoS can and have affected many if not all industries. This ranges from being able to place bets on gambling sites to trying to clear out your cart on an e-commerce site.

Everyone with a storefront on the internet has at one point or another suffered the simulated feeling of being an employee having to work retail on Black Friday. DDoS attacks have been around for quite some time, the earliest attack was back in the late 90s and they have been evolving ever since.

man in red polo looking shocked.
We’ve all made this face at one point or another while on the toliet.
Photo by Andrea Piacquadio, please support by following @pexel.com

Made it this far and found this to be entertaining? Then a big thanks to you and please show your support by cracking a like, scripting a comment, or plug-in to follow.

Would like to give sincere thanks to current followers and subscribers, your support and actions mean a lot and has a play in the creation of each script.

Do you feel like I may have missed something about DDoS? Script a comment below.

Paying with Options All Around

Consider following on social media!

Quick note: if you’re viewing this via email, come to the site for better viewing. Enjoy!

I will not turn around until someone explains the cloud to me.
Photo by Felix Mittermeier, please support by following @pexel.com

Heading Onward

The cloud, for most people, is a mystery, for others, it’s a place for people to brag about where they house their data, and for the growing population of others, it’s a place where all the payment plans come from.

Since Cloud has stepped or more likely floated on the scene, depending on who you ask, there has been a slew of payment plans being offered that weren’t thought of before. And the people who benefit most from it aren’t big-name companies, they’re cybercriminals.

Payment plans in cloud computing are different methods that customers can pay for the services and resources they use from cloud providers.

There are different types of payment plans, such as pay-as-you-go, subscription, reserved instances, spot instances, and free tier. Each payment plan has its own advantages and disadvantages, depending on the customer’s needs and preferences.

Pay-as-you-go is the most flexible and common payment plan, where customers only pay for what they use, without any upfront or long-term commitment. A subscription is a payment plan where customers pay a fixed amount per month or year for a certain level of service or resource allocation.

Enjoy the read so far? Why don’t you consider subscribing so you can keep up to date?

We’re cloud providers and you can pay-as-you-go, we promise.
Photo by Timur Weber, please support by following @pexel.com

Reserved instances are a payment plan where customers pay upfront for a specific number of resources for a certain period of time, usually at a discounted rate.

Spot instances are a payment plan where customers bid for unused resources at a variable price, which can be lower or higher than the regular price. The free tier is a payment plan where customers can use a limited number of resources for free, usually for a trial period or for testing purposes.

What’s that? These are all great things; they’re offering different ways for people to be able to make payments on their bills. We can you hear say, and we say to you; Remember this is the internet we’re talking about here. Nothing here stays pure.

However, with this same concept for payment options in the cloud comes similar payment options on hacking forums and other seedy places to trade data. A few of the payment plans (feel free to look them up as we’ll be sure that you’ll find them and more) are phishing-as-a-service, scam-as-service, malware-as-a-service, ransomware-as-a-service, and many more.

We’re not too sure how some of these services actually work, the idea could be similar to cloud payment plans, but the fact that they’re out there and growing in numbers seems promising for the cyber problems to come.

Made it this far and found this to be entertaining? Then a big thanks to you and please show your support by cracking a like, sharing this with whomever, scripting a comment, or plug-in to follow.

Would like to give sincere thanks to current followers and subscribers, your support and actions mean a lot and has a play in the creation of each script.

Do you feel like there is something I may have missed on various as-a-service payment plans? Script a comment below.

Cracking Isn’t What You Think It Is

Consider following on social media!

Quick note: if you’re viewing this via email, come to the site for better viewing. Enjoy!

teenagers seated viewing their cellphones
Eric: Z-Daddy put up another script.
Sean: I know, I’m reading it… and stop calling him that. That’s weird bro.
Photo by Pixabay, please support by following @pexel.com

Here’s a question for you. Can you recall what you were doing back in your younger days? Like around the age of 15 or maybe even younger, 12. I would assume that for most people, you were either being grounded by your parents (or parent, I understand for some people a single-parent ran household may have been a reality) for something stupid you did or not being grounded and running around outside with your friends.

The point was, you were too busy either with your parents or with your friends to even have the thought of being seated in front of a computer. And in some cases, this shows signs that you grew up with a healthy childhood. But on the other hand, if you were, or tend to be anti-social, then forming together all the hallmark traits of becoming a hacker could have been something on the menu for you. You don’t know what a hacker is? Let me script it for you.

young man pulling up hoodie
It’s hacking time.
Photo by Mati Mango, please support by following @pexel.com

Hacking Many Hats

Before we start this, I want to be clear, hackers do not sit in front of a computer in the dark typing really fast with a hoodie on trying to crack code…the brightness from the screen tends to hurt our eyes after a while. There are a lot of meanings for the term “hacker”, but the actual definition doesn’t match the sexiness of Hollywood’s definition.

A hacker is someone who uses their skills to gain access to systems and networks without authorization. And before you ask, no, there isn’t an age limit to becoming a hacker. Hackers often fall into one or two of the three categories, you have “Black Hat” – the cybercriminal who is looking to illegally access a system with malicious intent, “White Hat” – the “good guy” who identifies weaknesses in an architecture of an organization which they then inform and advise, and last is “Gray Hat” – which is the combination of both white hat and black hat. Needlessly to say, they operate to what suits their best interest at the given time.

There are other types of a hacker, “Green Hat” – newborn hackers, “Blue Hat” – are white hats who are employed to improve security systems and conduct pen-testing, and the last is “Red Hat” – which are vigilante hackers, these are the individuals that hack in the name of justice.

old man holding up a fan of cash
Businessman…the old school hackers before the internet.
Photo by Andrea Piacquadio, please support by following @pexel.com

Big Wins with You Losses

Hackers tend to go after big-name financial institutions because of the chance to win big and get a nice payday. However, the risk of doing so results in possibly being caught, fined, and put in prison. So what is a better alternative to avoid that? That’s right, you guessed it, they target the little guy, putting your sweet cornhole on the menu.

While your money may be the most important thing to you, your information like social security, address, and entire name, pretty much everything that says who you are online and in life is way more valuable to a hacker.

The collecting of your personal information is called “information aggregation” and once complete or they feel enough is acquired could result in you getting charged for things you didn’t sign up for, like a loan, a timeshare, or getting a speeding ticket in the mail for a car you don’t own. Basically, your data goes up for sale on the dark web to the highest bidder. And here you were thinking no one had an interest in you, well not you per se since it’s the data they want but still don’t discredit yourself. You go you.

Enjoy the read so far? Why don’t you consider subscribing so you can keep up to date?

teen looking up at the sky.
The sky is the limit on how many accounts I can hack.
Photo by Myicahel Tamburini, please support by following @pexel.com

Hacking When We were Young

Remember when I mentioned that anyone could be a hacker? I was kidding but then again, I wasn’t. You see hackers can come in many shapes, sizes, and flavors. Flavors are the level of skills that they possess to get the job done. Most hackers are often referred to as “Script Kiddies” (No, there’s no relation to them and this site, you’re safe), they’re low-level and mainly purchase malicious code also known as scripts to use to perform malicious attacks.

But then you have your hackers who really know what they’re doing. Such as the likes of Kevin Mitnick- the world’s most famous computer hacker. He hacked into North American Defense Command, Digital Equipment Corporation’s network system. He was arrested and later upon release, decided to hack Pacific Bell’s voicemail system as a flex to show that he could.

Albert Gonzalez started around the age of 12 and was later arrested for debit card fraud in relation to stealing card information. He stole more than 180 million payment card accounts across different companies. And Jonathan James or maybe formally known by his fictitious name “C0mrade”, was deemed one of the best hackers in history.

This was attributed to him gaining access to private network systems with the flex being “this was done just for the fun of it”. Again, recall what you were doing back when you were 15, at the age of 15, he hacked into NASA (National Aeronautics and Space Administration), the Department of Defense (DoD), and South Bell to steal software.

This is insane because his hacking into NASA led to them being shut down for 21 days and cost about $41,000. Getting things fixed was cheaper back in the day, am I right?

young man with a look of worry
I just had to click on a file saying, “Baddies: one-click nude-pic”.
Photo by Mati Mango, please support by following @pexel.com

So, you’re probably worried about trying to protect yourself from getting hacked and having all your juicy information all over the internet. Well, I have good news, it’s too late. Well, not entirely, maintaining best practice use of devices and being mindful of your interactions on the internet could save you a lot of financial pain in the long run.

Never leave your device alone in an area whether you trust your surroundings or not, practice using complex passwords – involving letters, numbers, and characters, which makes it harder and takes more time to crack. Do not use any part of your name or the name of anyone you may know for Bluetooth and or Wi-Fi devices as this could give hackers possible information to utilize and further their pursuit.

Always use multi-factor (MFA) or two-factor authentication (2FA) when dealing with online accounts and any other login site as this helps with ensuring that it is you accessing them. Always make use of anti-virus/anti-malware as this will hinder hackers’ attempts to install unwanted programs/files onto your machine. And always make sure your operating system, the OS, is up to date.

Most of how to protect yourself is using common sense, like you wouldn’t just leave your front door unlocked while you’re away on vacation or just have some random person walk in your house to Netflix and chill, don’t leave your device unattended, and don’t let people you don’t know on your device or network. I mean I know hackers can get clever and lucky but most of the time it’s made easy for them.   

gentleman in suit face palming his head.
I have a degree in computer science but what I really needed was common sense.
Photo by Andrea Piacquadio, please support by following @pexel.com

Made it this far and found this to be entertaining? Then a big thanks to you and please show your support by cracking a like, sharing this with whomever, scripting a comment, or plug-in to follow.

Would like to give sincere thanks to current followers and subscribers, your support and actions mean a lot and has a play in the creation of each script.

Do you have a feeling that may have missed something about hackers? Script a comment below.