Being on the grid made easy.

Consider following on social media!

Quick note: if you’re viewing this via email, come to the site for better viewing. Enjoy!

Hmmp, funny thought.
Photo by Pixabay, please support by following @pexel.com

You know, there is always something you could learn on the internet. If you’re interested in getting better at math, you can learn how to do equations better, if you’re interested in learning another language, you can find courses online (or people in real life) and learn. And if you’re interested in finding out if your supervisor has an O.F. page so you can later use it for blackmail, there’s sure a place for that as well.

Well, not so much the last point since all you would have to do is a quick search– however, we’re not here to tell you how to ruin others, you’re an adult (we hope), so do your research. To the point, there has been a term making its rounds in the cybersecurity realm which at first glance may seem like a good idea but upon closer examination, it may have you saying “Oh, dear”.

Wait, I can get better at math?
Photo by Andrea Piacquadio, please support by following @pexel.com

The Attack

So, what is this term that was been square dancing all over the internet and two-stepping into the organization’s heart of fear? Look no further than LOTL. At first glance, you wouldn’t be wrong for thinking it breaks down to Lot Lizard, however, you’re wrong. And if you don’t know what they are, again, you’re an adult (we hope), do your research. If you don’t feel like doing your research, we’ll give you a hint. They have been known to be a fun bunch and have nothing to do with lizards. Unless you’re talking about the lizard part of the brain, then they may have found a cleverly way to incorporate fun time with science. Meh, who knows?

Humans have lizard parts in their brains? Who knew?
Photo by Robert Nagy, please support by following @pexel.com

Who Can It Be Now

LOTL is “Living off the land”, this is a form of cyber-attack where the threat actor carries out malicious activities using legitimate IT admin tools. This goes along with using RAT (Remote Access Tools), the end goal is to get into the system or network and escalate their user privileges. Why would someone want to increase their user privileges, we can hear you ask. Well, the answer is simple, anything you can do, they can do as well, if not, better.

Enjoy the read so far? Why don’t you consider subscribing so you can keep up to date?

Yes, your browser history is most interesting.
Photo by Mikhail Nilov, please support by following @pexel.com

That Sinking Feeling

You might be wondering, how is something like this done. There are many ways this is executed but for the most part, it comes from an insider threat. Insider threat actors have knowledge about the organization they work for and already are trusted members, with these two factors make them the prime candidates for wreaking havoc.

Blamed for something I didn’t do. I can’t possibly see why I would be disgruntled.
Photo by Yan Krukau, please support by following @pexel.com

The Prevention

So, you’re a big company and you’re looking to protect yourself from insider threats. How can you protect yourself? The answer is simple, pay the people who work for you well, and you won’t have any problems. Obviously, we can hear you chuckling under your breath, yes, we know that’s not going to happen. Jokes aside, you can’t protect yourself 100% since you’re always going to have something that someone else or an organization wants. These threat actors could be hired by your competitors to sabotage or steal valuables from you. The best thing to do is to have training for employees in common cybersecurity issues and how to handle them and be vigilant when in the presence of odd behavior from others. This includes finding out that Bob from accounting has been living in the storage closet for about three weeks now, it’s understandable his wife kicked him out and he has nowhere to go, but this does classify as suspicious insider threat behavior and needs to be reported.

Yeah, I came up with these numbers while in the storage closet. I do my best work there.
Photo by Kampus Production, please support by following @pexel.com

Made it this far and found this to be entertaining? Then a big thanks to you and please show your support by cracking a like, sharing this with whomever, scripting a comment, or plug-in to follow.

Would like to give sincere thanks to current followers and subscribers, your support and actions mean a lot and has a play in the creation of each script.

Do you feel like there is something I may have missed on LOTL? Script a comment below.

A Virus Built with Love

Consider following on social media!

Quick note: if you’re viewing this via email, come to the site for better viewing. Enjoy!

Sean: I’m always here for you.
Samantha: That’s great but you only have $30 in your pocket, and I only have three more minutes left.
Photo by Ana Maria Moroz, please support by following @pexel.com

Here’s a strange question for you. Have you ever loved someone so much that you create something in their name? Not like a creepy shrine or anything like that, I mean create something and let it loose on the internet for it to wreak havoc on the world.

If you haven’t, then you’re a part of the unlucky club as most people haven’t experienced that kind of love. Well… I say love but it very well could be just wanting a good “fun hugging” time and things just didn’t work out because well, money.

It kind of makes the world go round. However, let me script to you someone who has and how the internet went ablaze with the “You got mail” era.

You pay, I slay.
Photo by Efigie lima Marcos, please support by following @pexel.com

50 Networks of Melissa

Back in the heyday of AOL (America Online), there once was a virus called “Melissa”. I know someone is probably offended and wondering why their name is a computer virus that may be oddly categorized wrong since worms replicate themselves throughout a network, which is what this “virus” did.

I’m not going to get into the politics of it. Just know this virus was created and released, and many people were upset. Melissa (sorry for anyone known by this name and reading this), is what is called a “macro virus” – meaning this virus was written in the same language Microsoft Word and Excel were developed in.

Melissa (again, sorry, I didn’t choose the name) would hide in spreadsheets and activate as soon as you open the file, once opened triggers malware made to wreak havoc on your machine and further spread the virus to the edges of your contacts list and theirs and so on and so on. Melissa was the kind of gal that kept on giving.

David: I told you already, her name is Melissa, and she loves me.
Dr. Paterson: David, we’ve been over this. A computer virus that you created can’t love you.
Photo by Timur Weber, please support by following @pexel.com

Breaking AOL and Beyond

You may be wondering, who was this madman or madwoman, it’s wrong to assume the gender nowadays, that created this virus in the name of love. Look at no other person than David Lee Smith.

David chose to make use of the confusion surrounding the internet and email at the time since the internet or web1 was in its early stages. I don’t see how there was that much confusion, it was either you have mail or you don’t have mail. It seems pretty straightforward if you ask me, but you didn’t so whatever. Rambling aside, David, in late March of 1999, hijacked an AOL account and used it to post a file on an Internet newsgroup name “alt. sex”.

The post was promising a really good time because it offered over a dozen free passwords to websites where you had to pay for adult content. Posting like that nowadays wouldn’t have much of an effect since most of what you want to watch is free however, I am aware there are a number of you out there who are broken and may need to find some “harder material”. Like cats being shuffled around in duffle bags, Z-Daddy isn’t judging.

Oh, and he chose to name this virus Melissa after a stripper that he was into. I’m guessing the story is, he fell in love, and she said you don’t have any more money, he got depressed and created a virus, giving it her name to make her famous.

Enjoy the read so far? Why don’t you consider subscribing so you can keep up to date?

Hello from the other side, I’ve must’ve called a thousand times.
Photo by Hebert Santos, please support by following @pexel.com

Setting Fire to the Network

So, what were the effects of Melissa’s presence? Well aside from overloading email servers at more than 300 corporations, government agencies included, no the government is not happy when you mess with them however they are giddy when they get to mess with you, it ended up shutting them down entirely along with costing $80 million in damages.

The virus functionality worked in the form of phishing, where you would open an email and click on an attachment, the infected file would then activate and read to the computer’s storage where it would create an Outlook Global Address. After this, the virus would then send copies of itself to the addresses read.

So in a nutshell, this would get into your machine, find your list of contacts, and begin its great journey spreading itself down everyone’s cornhole. Psychotic ex strippers…am I right?

I will siren your bank account and beyond.
Photo by Somewherewith Tom, please support by following @pexel.com

Protection Against Sirens

You don’t need to worry about this Melissa getting into your life and mucking it up anymore, well for the most part. The news spread fast enough to slow the spread allowing cybersecurity professionals to contain and restore their networks. However, this doesn’t mean that you’re free to run around clicking on links promising you a good time.

There is a wide array of viruses out on the internet that have the same attributes as Melissa. But ways you could prevent her from ever knocking on your door…well, one way is not forgetting to tip your bartender and close your tab.

Always follow good bar patron best practices. When checking your email, if you find you have to take a double look because something seems grammatical or misspelled, for example, “h0w ar e    you” versus “how are you”. If the email you received came from someone you know, it’s always a good thing to double-check with them to confirm that they sent it.

Always use an antivirus/antimalware/antispyware and make sure your operating system is up to date as patches for any vulnerabilities would include improving the safety of not only your computer but your wallet as well.

But to protect yourself entirely is just to use common sense and if it looks phishy, then don’t engage, and delete it immediately. On the internet Melissa has friends and they can do the same thing as her, if not better, just when you thought she was one of a kind.

Seth: The latest script was like OMG, and it made me ten times happier to be with you.
Tina: I know, Z-Daddy made me feel the same way.
Photo by cottonbro studio, please support by following @pexel.com

Made it this far and found this to be entertaining? Then a big thanks to you and please show your support by cracking a like, sharing this with whomever, scripting a comment, or plug-in to follow.

Would like to give sincere thanks to current followers and subscribers, your support and actions mean a lot and has a play in the creation of each script.

Think there was something I missed or may have gotten wrong about Melissa? Script a comment about it down below.

Demystifying Cloud Computing: Unveiling Its Transformative Technology

Key Takeaways

  • Cloud computing is a powerful technology, not just a financial term.
  • It delivers computing services (servers, storage, databases, etc.) over the Internet.
  • Benefits include:
    • Accessibility: Use IT resources from anywhere.
    • Cost-Effectiveness: Pay for what you use, no upfront costs.
    • Scalability: Easily adjust resources based on needs.
    • Performance: Access high-performance computing hardware.
    • Security: Many providers offer robust security features.
    • Innovation: Experiment and develop new applications faster.
  • Cloud computing empowers businesses of all sizes and makes technology more accessible to individuals.
  • Understanding cloud computing is crucial for success in the digital age.
The cloud stocks seem to be trending upwards, my bank account is another story.
Photo by Anna Nekrashevich, please support by following @pexel.com

Cloud Computing: Beyond the Stock Ticker

Introduction to Cloud Computing

In the modern digital landscape, cloud computing has become a ubiquitous term, often mentioned in the same breath as big tech companies and stock market fluctuations. However, cloud computing is much more than just a buzzword or a financial instrument; it’s a revolutionary technology that has transformed the way we use and understand information technology (IT).

What is Cloud Computing?

At its core, cloud computing is the delivery of computing services—including servers, storage, databases, networking, software, analytics, and intelligence—over the Internet (“the cloud”) to offer faster innovation, flexible resources, and economies of scale. It allows users to access and store data without direct active management by the user. The end result is increased efficiency, reduced costs, and the ability to scale resources on demand.

The Misconception of Cloud Computing as Just Stocks

Often, when cloud computing makes headlines, it’s related to the stock performance of major cloud service providers like Amazon Web Services (AWS), Microsoft Azure, or Google Cloud Platform (GCP). While it’s true that these companies’ cloud divisions generate significant revenue and are a focal point for investors, reducing cloud computing to mere stock options overlooks its profound impact on businesses and individuals alike.

Send your business upwards in seconds with cloud technology.
Photo by Dellon Thomas, please support by following @pexel.com

The Real Value of Cloud Computing

The true value of cloud computing lies in its capabilities and the benefits it offers to its users. Here are some key advantages:

Accessibility: Cloud computing enables access to IT resources from anywhere with an internet connection.
Cost-Effectiveness: It reduces the capital expense of buying hardware and software and setting up and running on-site data centers.
Scalability: Services can be scaled up or down based on demand, ensuring you only pay for what you use.
Performance: Cloud computing services run on a worldwide network of secure data centers, which are regularly upgraded to the latest generation of fast and efficient computing hardware.
Security: Many cloud providers offer a set of policies, technologies, and controls that strengthen your security posture overall, helping protect data, apps, and infrastructure from potential threats.
Innovation: With cloud computing, users can experiment and innovate more quickly and efficiently. They can try new concepts, design new applications, and automate business processes.
The Impact on Businesses and Individuals

For businesses, cloud computing has been a game-changer. It has enabled startups to compete with established players by giving them access to the same IT resources. For individuals, cloud computing has made services like email, document editing, and storage available on a subscription basis, making these tools more accessible than ever before.

Demystifying Cloud Computing for IT Beginners

If you’re new to IT, understanding cloud computing might seem daunting, but it doesn’t have to be. Think of it as renting a house—you have all the facilities you need without the responsibility of maintenance or the high upfront costs of buying.

Should I really start using the cloud?
Photo by Craig Adderley, please support by following @pexel.com

Are you intrigued by the potential of cloud computing? Do you see how it could benefit your business or personal life? Share your thoughts and questions in the comments section below. Let’s demystify cloud computing together and explore how this technology can be leveraged for greater efficiency and innovation.

Conclusion

Cloud computing is not just a line item on a stock ticker; it’s a transformative technology that has democratized access to IT resources. As we continue to embrace digital transformation, understanding and utilizing cloud computing will be crucial for success in any field.

Remember, cloud computing is about enabling possibilities—whether you’re a business owner, a developer, or simply someone interested in the future of technology. Dive in, explore, and let the cloud take you further than you ever imagined.

Love learning tech? Join our community of passionate minds! Share your knowledge, ask questions, and grow together. Like, comment, and subscribe to fuel the movement!

Don’t forget to share.

Every Second Counts. Help our website grow and reach more people in need. Donate today to make a difference!

One-Time
Monthly
Yearly

Make a one-time donation

Make a monthly donation

Make a yearly donation

Choose an amount

$5.00
$15.00
$100.00
$5.00
$15.00
$100.00
$5.00
$15.00
$100.00

Or enter a custom amount

$

Your contribution is appreciated.

Your contribution is appreciated.

Your contribution is appreciated.

DonateDonate monthlyDonate yearly