The Audit  Podcast - Trailer
0:53
2 ай бұрын
Пікірлер
@dathaniel9403
@dathaniel9403 18 күн бұрын
I think Damian Lewis has a point
@Pwnagotchi-0
@Pwnagotchi-0 Ай бұрын
Man I just found out about these a week ago and finished . Parts came yesterday finished last night
@theauditpresentedbyital
@theauditpresentedbyital Ай бұрын
Have you been able to use it? We would love to hear what you think.
@mirkadodo
@mirkadodo 2 ай бұрын
Chat rooms reconnected worldwide you can use Google, Thor, Duck duck ducks go everywhere, donkeys, pigs ,You are searching for something online for what? for a GF?,I think you are not stupid like that
@mirkadodo
@mirkadodo 2 ай бұрын
Do you know Giovanni hacker?I don't know but this type is blind because No is not an option for him
@mirkadodo
@mirkadodo 2 ай бұрын
Me and Hackers Its Never ending story I adore them the most when I don't see them but they are after my ass for all the time
@mirkadodo
@mirkadodo 2 ай бұрын
We are having couple of choices
@mirkadodo
@mirkadodo 2 ай бұрын
What type of Natural Disaster are you?!
@mirkadodo
@mirkadodo 2 ай бұрын
What's up?!
@cgwworldministries83
@cgwworldministries83 2 ай бұрын
I call 100% bs. Why? You would have a video proving it. If it sounds too good to be true, it's probably a lie.
@ROO1KAT
@ROO1KAT 2 ай бұрын
Proving what?
@cgwworldministries83
@cgwworldministries83 2 ай бұрын
@@ROO1KAT that plastic can hold the weight of an aircraft. 🧢🧢🧢
@theauditpresentedbyital
@theauditpresentedbyital 2 ай бұрын
Thanks for your comment. The aircraft is a smaller single engine plane and the PLA material in the honeycomb pattern works like a charm.
@cgwworldministries83
@cgwworldministries83 2 ай бұрын
@@theauditpresentedbyital sorry pla can't hold that much weight. Prove it please. I want to be wrong so bad. But chances are I'm not.
@werdnax4981
@werdnax4981 3 ай бұрын
ok and what does this mean?!
@theauditpresentedbyital
@theauditpresentedbyital 3 ай бұрын
Splitting VPN traffic refers to directing certain types of internet traffic through a VPN while allowing other types of traffic to bypass the VPN connection and use the regular internet connection. Allowing you to enjoy the cat videos. There are several reasons why a company might choose to split VPN traffic: Security: By routing only specific types of traffic through the VPN, such as sensitive data or communications, a company can ensure that this data is encrypted and secure while in transit over the internet. Meanwhile, non-sensitive traffic can bypass the VPN, reducing the load on the VPN infrastructure and potentially improving network performance. Compliance: Certain regulatory requirements or industry standards may mandate that sensitive data be transmitted over secure connections, such as VPNs. Splitting VPN traffic allows companies to ensure compliance with these requirements while still allowing non-sensitive traffic to use regular internet connections. Performance: VPN connections can sometimes introduce latency and affect network performance, especially for bandwidth-intensive applications. By splitting VPN traffic, companies can prioritize critical applications or services that require low latency and high bandwidth while directing less critical traffic over regular internet connections. Resource Management: VPN infrastructure can be costly to maintain and scale, especially for large organizations. By splitting VPN traffic, companies can optimize resource utilization by directing only necessary traffic through the VPN, thereby reducing the load on VPN servers and conserving bandwidth. Geographic Restrictions: Some online services or content may be restricted based on geographic location. By splitting VPN traffic, companies can allow employees to access geo-restricted content or services using the IP address provided by the VPN, while other non-restricted traffic can use regular internet connections. Overall, splitting VPN traffic allows companies to balance security, compliance, performance, and resource utilization based on their specific needs and requirements.
@brettlaw4346
@brettlaw4346 3 ай бұрын
How vulnerable are VPNs to BGP routing attacks?
@theauditpresentedbyital
@theauditpresentedbyital 3 ай бұрын
A BGP routing attack is essentially an attacker causing a router to impersonate IP addresses it doesn’t control. Attackers can exploit this by controlling or compromising a BGP-enabled router to announce routes to IP addresses, effectively diverting traffic through their network for interception or manipulation. Since the VPN traffic is encrypted the risk of compromised data is low. Here's a great explaining BGP hijacking at length, but feel free to respond with any additional questions. www.cloudflare.com/learning/security/glossary/bgp-hijacking/
@GoodGuyBiker
@GoodGuyBiker 3 ай бұрын
id lvoe to chat more about this type of stuff
@theauditpresentedbyital
@theauditpresentedbyital 2 ай бұрын
We would like that as well. We are planning another Pwnagotchi episode in the near future but in the meantime, you may be interested in our Episode on Flipper Zero. kzbin.info/www/bejne/nKKmhpeYiLlsb7c
@NeonEFX
@NeonEFX 3 ай бұрын
I love these videos where you get to meet the teams behind awesome companies like Audit Labs which I just learned about last night ... I really enjoying watching their videos and they seem to have an excellent team... Keep up the good work ;) , Oh and maybe respond to your commenters once in a while it goes a long way ...Im sure your busy though doing actual work 😁 😁 lol
@theauditpresentedbyital
@theauditpresentedbyital 2 ай бұрын
Yes, we are very busy but very much enjoy hearing your feedback. Thanks for tuning in! Are there any cybersecurity topics you would like to hear more about?
@WorldWideGamerr
@WorldWideGamerr 4 ай бұрын
You sir are talking in hamburger and should stop forever
@UramazingXxX
@UramazingXxX 4 ай бұрын
wait so i can earn loads of money by selling my ip address?
@theauditpresentedbyital
@theauditpresentedbyital 2 ай бұрын
No, not exactly. The apps and internet providers are collecting your data to package and sell. You can learn more by watching the full length episode. Thanks for the comment! kzbin.info/www/bejne/sIGlmoedmambfbs
@vasilisgreen
@vasilisgreen 4 ай бұрын
Aren't IP addresses distributed through a NAT? Having your IP address alone is useless.
@YTInnovativeSolution
@YTInnovativeSolution 5 ай бұрын
At 14 minutes, that already exists.
@theauditpresentedbyital
@theauditpresentedbyital 4 ай бұрын
You are correct! Thanks for your comment.
@YTInnovativeSolution
@YTInnovativeSolution 4 ай бұрын
@@theauditpresentedbyital those pet access doors are WiFi enabled and you can set a lockdown or a pet cerfew remotely. The RFID door is a great idea. The thing I have been curious about is how well does it work keeping other animals out in the real world application. Some cats scare easily, some have balls of steel, all are curious, and there is the infamous cat games played at the door when the owner is letting them in or out. The raccoons are smart and determined. I'm just thinking aloud because my decision to purchase one is a tough one to make. However, my Flipper had no problem reading the RFID device in my cat. This ability is great and it has already got one kitty back home.
@ShrigmaFemale
@ShrigmaFemale 5 ай бұрын
Right wingers have been doing attacks like this on everyone else for decades.
@jacarranda
@jacarranda 6 ай бұрын
Leah is an inspiration! Thank you!
@bigfrankfraser1391
@bigfrankfraser1391 8 ай бұрын
my question is, is it breaking any laws edit: way i understand it it, it might not be illegal to receive the data, but im a bit iffy about it
@joshualeeth
@joshualeeth 6 ай бұрын
It’s only illegal if you get caught.
@ClickClack_Bam
@ClickClack_Bam 4 ай бұрын
I doubt it's illegal in general. When these devices lose power or reset etc, they'll generally go through this same process of hooking back up as I understand it. This device captures that process. Now from my understanding they'll cause this process to happen by kicking them off of being hooked up & then capture them hooking back up. I don't see how it's illegal to cause this as they do this by themselves so what's illegal about you causing this? Now where I think this gets into the definite gray & illegal area is your intent underneath all of this. If you're doing this to capture WiFi handshakes to crack passwords to steal someone's network etc then yes it's illegal.
@cadehcim855
@cadehcim855 4 ай бұрын
love it loool@@ClickClack_Bam
@unitazer
@unitazer Ай бұрын
It is legal to listen, capture and send at any frequency you want without restrictions (except military reserved one ofc), the legally questionable part is what you are doing with it. If you use it to capture a wpa2 handshake of a network that you dont own, AND use it to obtain the password, it might be illegal. But to be honest if your password can be brute-forced in a reasonable amount of time its a skill issue, > 10 digits and a letter is more than enough security against a brute force just dont make it obvious
@biocode2856
@biocode2856 8 ай бұрын
Can you make your self CEO with a PDF
@biocode2856
@biocode2856 8 ай бұрын
I got a ? What can you do with a PDF LOL
@thecharmcityredneck3870
@thecharmcityredneck3870 9 ай бұрын
Idk how I got this video on my thing. But what the hell is a quantum computer and what does it do?
@theauditpresentedbyital
@theauditpresentedbyital 8 ай бұрын
Thanks for watching. You can find more info on the full length episode. kzbin.info/www/bejne/kJeseZWYn6aViqs
@Drey_doll
@Drey_doll 9 ай бұрын
Thank you that actually help me a bit more understand this. My other explanation didn’t talk about how liquid nitrogen is pushed through. And that’s it’s actually down at the bottom along with why it’s pushed to being so cold.
@theauditpresentedbyital
@theauditpresentedbyital 8 ай бұрын
Our pleasure. Thanks for watching. You can learn even more on the full length episode. kzbin.info/www/bejne/kJeseZWYn6aViqs
@santansaif9
@santansaif9 11 ай бұрын
@theauditpresentedbyital
@theauditpresentedbyital 11 ай бұрын
Thanks for watching!