Man I just found out about these a week ago and finished . Parts came yesterday finished last night
@theauditpresentedbyitalАй бұрын
Have you been able to use it? We would love to hear what you think.
@mirkadodo2 ай бұрын
Chat rooms reconnected worldwide you can use Google, Thor, Duck duck ducks go everywhere, donkeys, pigs ,You are searching for something online for what? for a GF?,I think you are not stupid like that
@mirkadodo2 ай бұрын
Do you know Giovanni hacker?I don't know but this type is blind because No is not an option for him
@mirkadodo2 ай бұрын
Me and Hackers Its Never ending story I adore them the most when I don't see them but they are after my ass for all the time
@mirkadodo2 ай бұрын
We are having couple of choices
@mirkadodo2 ай бұрын
What type of Natural Disaster are you?!
@mirkadodo2 ай бұрын
What's up?!
@cgwworldministries832 ай бұрын
I call 100% bs. Why? You would have a video proving it. If it sounds too good to be true, it's probably a lie.
@ROO1KAT2 ай бұрын
Proving what?
@cgwworldministries832 ай бұрын
@@ROO1KAT that plastic can hold the weight of an aircraft. 🧢🧢🧢
@theauditpresentedbyital2 ай бұрын
Thanks for your comment. The aircraft is a smaller single engine plane and the PLA material in the honeycomb pattern works like a charm.
@cgwworldministries832 ай бұрын
@@theauditpresentedbyital sorry pla can't hold that much weight. Prove it please. I want to be wrong so bad. But chances are I'm not.
@werdnax49813 ай бұрын
ok and what does this mean?!
@theauditpresentedbyital3 ай бұрын
Splitting VPN traffic refers to directing certain types of internet traffic through a VPN while allowing other types of traffic to bypass the VPN connection and use the regular internet connection. Allowing you to enjoy the cat videos. There are several reasons why a company might choose to split VPN traffic: Security: By routing only specific types of traffic through the VPN, such as sensitive data or communications, a company can ensure that this data is encrypted and secure while in transit over the internet. Meanwhile, non-sensitive traffic can bypass the VPN, reducing the load on the VPN infrastructure and potentially improving network performance. Compliance: Certain regulatory requirements or industry standards may mandate that sensitive data be transmitted over secure connections, such as VPNs. Splitting VPN traffic allows companies to ensure compliance with these requirements while still allowing non-sensitive traffic to use regular internet connections. Performance: VPN connections can sometimes introduce latency and affect network performance, especially for bandwidth-intensive applications. By splitting VPN traffic, companies can prioritize critical applications or services that require low latency and high bandwidth while directing less critical traffic over regular internet connections. Resource Management: VPN infrastructure can be costly to maintain and scale, especially for large organizations. By splitting VPN traffic, companies can optimize resource utilization by directing only necessary traffic through the VPN, thereby reducing the load on VPN servers and conserving bandwidth. Geographic Restrictions: Some online services or content may be restricted based on geographic location. By splitting VPN traffic, companies can allow employees to access geo-restricted content or services using the IP address provided by the VPN, while other non-restricted traffic can use regular internet connections. Overall, splitting VPN traffic allows companies to balance security, compliance, performance, and resource utilization based on their specific needs and requirements.
@brettlaw43463 ай бұрын
How vulnerable are VPNs to BGP routing attacks?
@theauditpresentedbyital3 ай бұрын
A BGP routing attack is essentially an attacker causing a router to impersonate IP addresses it doesn’t control. Attackers can exploit this by controlling or compromising a BGP-enabled router to announce routes to IP addresses, effectively diverting traffic through their network for interception or manipulation. Since the VPN traffic is encrypted the risk of compromised data is low. Here's a great explaining BGP hijacking at length, but feel free to respond with any additional questions. www.cloudflare.com/learning/security/glossary/bgp-hijacking/
@GoodGuyBiker3 ай бұрын
id lvoe to chat more about this type of stuff
@theauditpresentedbyital2 ай бұрын
We would like that as well. We are planning another Pwnagotchi episode in the near future but in the meantime, you may be interested in our Episode on Flipper Zero. kzbin.info/www/bejne/nKKmhpeYiLlsb7c
@NeonEFX3 ай бұрын
I love these videos where you get to meet the teams behind awesome companies like Audit Labs which I just learned about last night ... I really enjoying watching their videos and they seem to have an excellent team... Keep up the good work ;) , Oh and maybe respond to your commenters once in a while it goes a long way ...Im sure your busy though doing actual work 😁 😁 lol
@theauditpresentedbyital2 ай бұрын
Yes, we are very busy but very much enjoy hearing your feedback. Thanks for tuning in! Are there any cybersecurity topics you would like to hear more about?
@WorldWideGamerr4 ай бұрын
You sir are talking in hamburger and should stop forever
@UramazingXxX4 ай бұрын
wait so i can earn loads of money by selling my ip address?
@theauditpresentedbyital2 ай бұрын
No, not exactly. The apps and internet providers are collecting your data to package and sell. You can learn more by watching the full length episode. Thanks for the comment! kzbin.info/www/bejne/sIGlmoedmambfbs
@vasilisgreen4 ай бұрын
Aren't IP addresses distributed through a NAT? Having your IP address alone is useless.
@YTInnovativeSolution5 ай бұрын
At 14 minutes, that already exists.
@theauditpresentedbyital4 ай бұрын
You are correct! Thanks for your comment.
@YTInnovativeSolution4 ай бұрын
@@theauditpresentedbyital those pet access doors are WiFi enabled and you can set a lockdown or a pet cerfew remotely. The RFID door is a great idea. The thing I have been curious about is how well does it work keeping other animals out in the real world application. Some cats scare easily, some have balls of steel, all are curious, and there is the infamous cat games played at the door when the owner is letting them in or out. The raccoons are smart and determined. I'm just thinking aloud because my decision to purchase one is a tough one to make. However, my Flipper had no problem reading the RFID device in my cat. This ability is great and it has already got one kitty back home.
@ShrigmaFemale5 ай бұрын
Right wingers have been doing attacks like this on everyone else for decades.
@jacarranda6 ай бұрын
Leah is an inspiration! Thank you!
@bigfrankfraser13918 ай бұрын
my question is, is it breaking any laws edit: way i understand it it, it might not be illegal to receive the data, but im a bit iffy about it
@joshualeeth6 ай бұрын
It’s only illegal if you get caught.
@ClickClack_Bam4 ай бұрын
I doubt it's illegal in general. When these devices lose power or reset etc, they'll generally go through this same process of hooking back up as I understand it. This device captures that process. Now from my understanding they'll cause this process to happen by kicking them off of being hooked up & then capture them hooking back up. I don't see how it's illegal to cause this as they do this by themselves so what's illegal about you causing this? Now where I think this gets into the definite gray & illegal area is your intent underneath all of this. If you're doing this to capture WiFi handshakes to crack passwords to steal someone's network etc then yes it's illegal.
@cadehcim8554 ай бұрын
love it loool@@ClickClack_Bam
@unitazerАй бұрын
It is legal to listen, capture and send at any frequency you want without restrictions (except military reserved one ofc), the legally questionable part is what you are doing with it. If you use it to capture a wpa2 handshake of a network that you dont own, AND use it to obtain the password, it might be illegal. But to be honest if your password can be brute-forced in a reasonable amount of time its a skill issue, > 10 digits and a letter is more than enough security against a brute force just dont make it obvious
@biocode28568 ай бұрын
Can you make your self CEO with a PDF
@biocode28568 ай бұрын
I got a ? What can you do with a PDF LOL
@thecharmcityredneck38709 ай бұрын
Idk how I got this video on my thing. But what the hell is a quantum computer and what does it do?
@theauditpresentedbyital8 ай бұрын
Thanks for watching. You can find more info on the full length episode. kzbin.info/www/bejne/kJeseZWYn6aViqs
@Drey_doll9 ай бұрын
Thank you that actually help me a bit more understand this. My other explanation didn’t talk about how liquid nitrogen is pushed through. And that’s it’s actually down at the bottom along with why it’s pushed to being so cold.
@theauditpresentedbyital8 ай бұрын
Our pleasure. Thanks for watching. You can learn even more on the full length episode. kzbin.info/www/bejne/kJeseZWYn6aViqs