Fun fact, at my work, if we are dealing with incredibly sensitive information, the protocol is to be in a locked room with no computers, and writing stuff on paper, possibly using a typewriter.
@user-cf2qr1xm3rАй бұрын
Great I can hack that by using the fast fourier transform series machine learning and audio recordings of the typewriter button taps to decode any messages
@1oneguythatАй бұрын
Sounds like a greentext story on 4chan.
@aznstride4325Ай бұрын
ridiculous. Sounds like your company has trust issues and doesn’t trust their existing security protocols. Hopefully everyone threw away the papers afterwards and no one talks about the stuff outside that building.
@GladiatorWorldChampionsGWCАй бұрын
@@1oneguythat💀
@gabrielepirovano3529Ай бұрын
same we write all orders on pen and paper, then bring them to the kitchen staff to be prepared It's sensitive because we write user information on the paper (usually comments on their appearance to remember them when we get to the table) We also don't have computers, but because they're expensive Hopefully we can buy a new spatula before the end of the year
@spindafan32725 күн бұрын
remember, the "cloud" is just someone else's computer.
@ChefDoesntCook7 күн бұрын
errrrr well it's servers
@spindafan3277 күн бұрын
@@ChefDoesntCook your mother
@cs_wolke4 күн бұрын
Still a computer@@ChefDoesntCook
@zeusolympus16643 күн бұрын
@@spindafan327technically cloud is just a way to slowly suck the blood out of their users by big tech corporates.
@zoutewandАй бұрын
I would like to share a fun fact that is tangential to the five eyes stuff. In the 90s there was a dutch anarchist/squat terrorist group called Rara (only targeting material, not people) that was watched by the dutch security agencies. After a while the dutch BVD (sec agency) realized that their observation squads were being. Observed. As it turns out, the group RaRa realised they were being watched and had set up 'contra observation groups', they were able to decode a lot of the BVD communication channels (as in, multiple kinds of devices, used for different forms of communications), had identified safe houses by cross-referencing those communications and they even ended up placing bugs on the observation cars of the BVD. This ended up with the BVD stopping their observations out of fear of Rara aqcuiring even more information. Imagine being a CIA agent and getting out CIA'd by a bunch of stinky punks. such a funny story
@theorixluxАй бұрын
Amazing
@joaoleite5785Ай бұрын
it's so weird how most of the people even in Cybersecurity are at insider threat level...
@7alen7Ай бұрын
@@joaoleite5785 frfr
@bot-cz8yoАй бұрын
sim
@ThaKartoffel29 күн бұрын
You are either trolling or talking about CISO's which got nothing to do with hands on security
@speedymemes812719 күн бұрын
Lots of inexperienced folks. We should try to educate them. Also these tiers are dumb anyways... I learned about MD5 hash collisions in CSEC 101 lmao.
@speedymemes812719 күн бұрын
@@ThaKartoffelsome of them used to, but yeah I've also been in environments where the CISO role is given to someone out of pure nepotism.
@Bloom10Ай бұрын
wait, this was 1 YEAR ago?! Thanks youtube for recommending me this hidden gem, very informative video man
@AAHyoАй бұрын
About the Lain attack. There is an anime called "Serial experiment Lain" and the attack was a reference to the anime
@7alen7Ай бұрын
@@AAHyo oh believe me, I'm familiar lmao, I try not to expose my weebish-ness to everyone
@fleurdelice777Ай бұрын
@7alen7 you just did
@7alen7Ай бұрын
@@fleurdelice777 😡
@occultsupport10 күн бұрын
@@7alen7 yeah the serial experiments of lain is a horrible anime
@TeighMart Жыл бұрын
This video was sick, well done. It's pretty hard to fit something as broad as cybersecurity into an iceberg video, but I think you captured it well. Honestly, I think doing a deepdive into some of the more interesting topics from this list would be a good idea if you're looking for what other people are gonna want to watch. I feel like there's not enough channels that dive into the history of cyber.
@Lightnang_9 ай бұрын
Yeah I agree ☝️
@reflex65882 ай бұрын
“Java is a great language to replace with C#” 🤣
@FictionHubZAАй бұрын
Java is pretty bad.
@freezafeesh9251Ай бұрын
@@FictionHubZAit isn't actually, it's very safe. You can solve all the issue with Java boilerplate by using Kotlin
@dum524724 күн бұрын
As someone who took Java for 2 years, I would rather dip my balls in a KFC fryer than use Java again
@12crenshaw21 күн бұрын
@@FictionHubZA coming out from someone who only ever used Scanner class and got lost writing main method presumably
@FictionHubZA21 күн бұрын
@@12crenshaw Unfortunately, I use Java every day. I make mobile applications using Java. And a few games using the GUI.
@kiyo693Ай бұрын
ofc i get recommended this after recent events
@7alen7Ай бұрын
@kiyo693 hope you're not a CloudStrike customer ;)
@kiyo693Ай бұрын
@@7alen7 my work is :(
@infernosgaming8942Ай бұрын
@@7alen7I feel bad, my Dad works in IT at a law firm and not only are the lawyers there some of the least tech savvy people he or I have ever interacted with, but nearly every single system, around 400 computers, got hit. Him and like four other IT guys had to go around the entire three floor office space and do the manual fix.
@dip999528 күн бұрын
@@7alen7I work at crowdstrike
@ashenrxse27 күн бұрын
Watching this as someone whose general knowledge of this iceberg ended in Level 2 with occasional spots later on, I was reminded of something William Gibson, author of Neuromancer, said. When he was writing the book back in the '80s, he had said he got the inspiration for the slang and lingo present in the now cyperbunk cult classic from listening to people's conversations. He described two of them being when he was listening to an ambulance driver, using the word 'flatline' as a verb to describe someone dying in an ambulance. The other was when he was listening to two computer software employees, and they were talking about some virus program. From there, he created the wonderfully flavorful and exotic slang present in Neuromancer that is now present in nearly all cyberpunk media. Gibson had never even touched a computer until after Neuromancer was published. I got the same feeling as Gibson listening to those two software employees watching this video. There were so many acronyms, events, phrases, and terms in the video that sounded like pure sci-fi at times. Excellent video. It was extremely informative. Thank you for taking the time to make this.
@__BLOOD__8 ай бұрын
Nice. Very nice. You pretty much summed up the most important events of the last decade. What you could add when talking about password hashes in databases is that they are more often salted in respectable enterprise software and then explain what that means.
@ShADOwWIZardMONeYgAnGGG Жыл бұрын
This needs more attention wtf good job bro
@0xg4842 ай бұрын
Cool vid, the Solomon seal I've often thought about.. We inscribe etchings on motherboards, make crystals think, have daemons that do processes for us, and we conjure light on a black mirror. MIT have that programming book too that leans heavily into the magician/conjurer perspective. Truly modern day terms applied to magic.
@@MutleeIsTheAntiGod "The Art of Computer Programming" de Donald E. Knuth, probably.
@destinysaid11 ай бұрын
Just to correct something. The term “Nigerian prince” and the associated scams are used all over the world and the country “Nigeria” takes the fall for hackers all over the world
@Lightnang_9 ай бұрын
That’s because Nigeria is one of the top countries for scammers. This is because of Socioeconomic and the limited access to jobs due to poverty, and unemployment. There’s also large organized groups of scammers from and in Nigeria that include necessary infrastructure and resources, as well as protection to carry out there fraudulent activities. Just look at the statistics and then come back to me.
@destinysaid9 ай бұрын
All the stats also power states like north Korea, Russia, eastern Europe states, certain "first world" countries and south asian countries. Scamming isn't a new thing and there are large organized crime syndicates everywhere, even in the glorious United States of America. None of the top 10 hacker groups responsible for billions of lost funds yeartly are from Nigeria, yet bloggers and the likes continue to churn stats they read from fellow unreliable sites. While hackers in north Korea and the likes get less scrutiny for their actions.@@Lightnang_
@DaTaskYtАй бұрын
@@Lightnang_ oga, he's Nigerian Of course he knows that. The ratio described by victim countries to be Nigerian Scams is kinda unfair.
@knownas2017 Жыл бұрын
This was a well done video! Great topics, too. Personally, I create videogame 'hacks' to modify things in-game. I don't release them to the public, nor do I do it for multiplayer games. I usually do it when I'm done with a game, and wanna mess around. Infinite gold! etc. Or if I'm stuck, for some reason. Stuck in a wall? Just... teleport out. :) It's very interesting to me, because I can guess/see how the developers designed their game, etc. (I also have fun making games) It's kinda fun, honestly. Also nice voice btw.
@7alen7 Жыл бұрын
Hacks for single player games are 100% ok by me. I think back to the days of using absurd cheats in GTA to mess around for a bit. If a game doesn't have those options, might as well create your own to get more enjoyment out of it :)
@knownas2017 Жыл бұрын
@@7alen7 Exactly! As long as it doesn't ruin someone's day, I think it's perfectly okay!
@Rosszy3055 ай бұрын
Baller video with great quality. Im actually studying for the security plus currently and starting as a Network Admin next month as well. Was actually on a study break when I came across this and found it awesome while also being kinda informative, well done sir.
@7alen75 ай бұрын
Best of luck with the exam! Odds are you're gonna do great (bc you watched my video, obviously lmao)
@cyndermayhemАй бұрын
as someone who's just getting into the field and grinding certs, this is pretty motivating. great vid!
@JLM-y5g5 күн бұрын
I've been struggling with my Cybersecurity schoolwork, and I'm almost "done"... but it feels like I didn't know any of the concepts in their simplest form/summary. This video gives me a beautiful foundation to use the other skills they taught me. Thanks.
@heawin8810 күн бұрын
This is the coolest thing ever. I love cybersecurity stuff like this that talks high level but takes the time to explain acronyms etc. Amazing job, my friend. Definitely worth the like, sub, and share for sure.
@goldensh0t439Ай бұрын
I’m so glad you made an iceberg for cyber!! These are helpful to zoom out and remember why you love this field so much. Thank you for this, it was very well made!
@kevinr7216Ай бұрын
Yooo the “wasting time billing hours” comment lemme tell ya…..is the most deeply relatable thing I’ve ever heard 😂😂😂
@0xAquaWolf Жыл бұрын
I searched for the ice berg and you delivered. Thank you Anon
@atomicaqua10 ай бұрын
This iceberg was extremely informative and each entry was explained very well. Thank you for making this, I am definitely going to go down a rabbit hole with some these topics lol
@Lightnang_9 ай бұрын
Yeah same with me 🎉
@Kayo4IifeАй бұрын
The wendigoon music in the background was the cherry on top to this video. Good job :D
@7alen7Ай бұрын
@@Kayo4Iife glad someone gets it
@TracksWithDax21 күн бұрын
This is awesome, I've been following cyber for several years but haven't broken in really. Glad to see I know a lot or most of these entries and that there's a lot in here that's brand new to me Would love to see a continuation or maybe individualized icebergs like "red team iceberg" etc
@samrichardson31222 ай бұрын
@<a href="#" class="seekto" data-time="60">1:00</a>:00 I believe the hacking typewriters refers to the Russian hacking of US type writers in the Moscow embassy.
@7alen72 ай бұрын
Lol, I made the iceberg so it definitely wasn't a reference to that, but it's cool nonetheless. I'll add the update to the description, thanks!
@donny48426 күн бұрын
@<a href="#" class="seekto" data-time="1358">22:38</a> Bitcoin is not an anonymous banking system, every crypto exchange requires your ID and every transaction is on the ledger. The only "true" anonymous way for crypto are the ones you mine yourself and with wallets that have no connection to any PII.
@ariffadilah7121 Жыл бұрын
finally The Cybersec Iceberg, been waiting for someone to made this
@atlas320211 ай бұрын
Great job on the video, very suprised it hasn't got more views, very well done.
@Lightnang_9 ай бұрын
Yeah, very underrated content. Gonna blow up one day ⬆️
@turnoff7572Ай бұрын
Blowing up rn@@Lightnang_
@jedwilliamson581518 күн бұрын
just got done playing dbd and started watching this and didnt even question it in the background at first lol
@clanoftheducks1850Ай бұрын
I was doing a shot game where if I didn't know a term I had to take a shot. I'm sitting here at 1 am on a Friday completely sober. I may need to touch some grass.
@7alen7Ай бұрын
@clanoftheducks1850 get some liquor in you brother! ASAP!!
@mtthsgrr3 ай бұрын
much love from Brazil buddy, you're a fun dude to watch ❤
@7alen73 ай бұрын
Much love to Brazil buddy, thanks for watching
@cobhallagames6997Ай бұрын
As a SWE, the fact that I DONT have a solid foundation in cybersecurity practices is probably not a good thing in the long run
@7alen7Ай бұрын
You'll be fine - it's what helps keep me in business ;)
@Lightnang_9 ай бұрын
You earned a sub! This video is absolutely amazing, this is the only privacy, cybersecurity related iceberg that I’ve found. I watched it from start to end. Loved the information and the way you explained it. Looking forward to more videos made by you! Have a great day! ❤🎉
@midnightanna992518 күн бұрын
As someone studying cybersecurity and IT on my own, this video is amazing. Thank you so much! I have so much more to learn now!
@Mat-tg4fk26 күн бұрын
Great video for those that want to get into the field. CS can be a thankless endeavor but its super fascinating if you find comedy in our sad world.
@RoyalReptilePirates2 ай бұрын
Really appreciate this information, really helps kinda break everything down! You kept me interested the whole time
@Liqweed133720 күн бұрын
one of the nastiest attacks are ones that silentinstall a ip tunnel tool and uses your machine as exit node for filesharing... the copyright lawsuit fines aggainst the exitnode user are huge because they think he is the filesharer
@blarblablarblarАй бұрын
Hi! Cool video. Just one thing to clarify, there are ways to make things zero-risk, but it usually involves making the information inaccessible to everyone including yourself, which oftentimes defeats the purpose of having the information in the first place.
@7alen7Ай бұрын
@@blarblablarblar no availability, maximum confidentiality
@CIPHERFLEXАй бұрын
Good pacing, I knew everything up to black badge and I have a CISSP! great format boss
@rendain7 ай бұрын
This was a really interesting iceberg video. You completely deserve more views!!
@phuqit4u2 ай бұрын
This is so good. Thank you for making this exceptional video about cyber.
@imodexe2646Ай бұрын
That second to last topic was quite deep, gen pop is spooked, you spittin!
@hazimirsyad7663 Жыл бұрын
Bro really hoping you end up on people's recommendation. Cool video!
@coolguy69verycool2 күн бұрын
This was great. I really want to know more about Solomon's Seal. It seems like it's just a meme and no one really talked about it much beyond that, though :(
@dysphoricpeachАй бұрын
<a href="#" class="seekto" data-time="2989">49:49</a> Being Turing complete is different from passing the Turing test. Being Turing complete requires the thing to be able to simulate a Turing machine. And a Turing machine is a simple machine that can implement any computer algorithm. For example, Minecraft and Conway's Game of Life are both Turing complete, but they don't really pass the Turing test.
@diegouy84829 күн бұрын
Pretty digestible video for good refreshers for exams like Sec+. It touches on Security terminology by associating them with anecdotes.
@heavensplayer2 ай бұрын
Could you place tinfoil around your desktop to stop the NSA from using radio waves to tap into it
@7alen72 ай бұрын
@heavensplayer you could, but if I do that then the voices stop and I run out of video ideas. Good luck to you though!
@heavensplayer2 ай бұрын
@@7alen7 lmfao
@y2konaАй бұрын
thank you for making this video! im gonna be majoring in cybersecurity engineering, so its cool to learn about the history and interesting tidbits of cybersec lore
@7alen7Ай бұрын
@@y2kona that was my bachelor's too, best of luck man!
@y2konaАй бұрын
@@7alen7 fank yew!
@7alen7Ай бұрын
@@y2kona anytime!!
@konjifx22 күн бұрын
im back here after several weeks into my cybersec training and i think im doing well because i understand most of what you're saying now 😊
@LETSGOITOFFICIALАй бұрын
You did a great job with this ! Looking forward to watching more such created vids!
@SirPaulDBD2 ай бұрын
I can appreciate the dead by daylight playing in the background. Nice video.
@thefrubАй бұрын
Your description gave me a good laugh 😂 Too many of these "cyber" channels out there are just trying to make a buck by selling pickaxes in a goldrush
@coffeecat08615 күн бұрын
I absolutely love icebergs because a lot of them are interesting, but if you watch any sort of documentary or investigation, depending on the topic like it’s iceberg so it needs it. I just wish they would add more things sometimes that may not be as well-known.
@theguywho4sked Жыл бұрын
bro your channel is so good
@thearmchairmystic8 ай бұрын
Empty internet theory is nothing compared to the empty NPC people walking around this realm, making things annoying for souls trying to escape this matrix.
@promisinger15 Жыл бұрын
Loved the vid. You have a nice channel. That red shirt survivor in the meat plant from @<a href="#" class="seekto" data-time="1932">32:12</a> to @<a href="#" class="seekto" data-time="2778">46:18</a> was SCHMIXING you though :P
@7alen7 Жыл бұрын
If I have to be honest, the juicing I was receiving had my blood boiling in that match fr
@delskif142525 күн бұрын
@@7alen7 dbd in a nutshell
@basvandriel249711 ай бұрын
Cool video man, suprised to see that you have so little subscribers, glad that I found you!
@scotthill1600Ай бұрын
Well off the bat I’m way past insider threat level & im proud of myself for that at least. Doubt I make it much further, time to learn
@TomisaMakerАй бұрын
So, in short, everything is hackable which reminds of: "your chance of X is small, but never 0", which is classic meme of: "so, you are telling me, there is still a chance?". Great video, btw.
@cat-rq2mb Жыл бұрын
Randomly got this in my recommended, good video bro
@The_Real_Meme_Lord_5 күн бұрын
This was a great video, I wish I had this as a chill learning video when studying for my CISSP haha. Any suggestions on how to break into the market? Worked in IT for 8 years just having a hard time getting into cyber.
@SquinkleАй бұрын
yo just wanted to say thanks for putting the time and effort to make this video
@Quertagon2 ай бұрын
this deserves waaaay more views! this definitely gave me a better oversight on what to learn next as i want to work in the field myself
@chappeyesАй бұрын
<a href="#" class="seekto" data-time="2995">49:55</a>, Turing complete has to do with Turing machines and systems and languages! Not with the Turing test!
@strang7739Ай бұрын
this is a great video - any tips for how you got into the field, i’ve been studying and getting a bachelors but struggling for lower end positions like help desk
@7alen7Ай бұрын
It's tricky to get into for sure - never forget that cyber isn't an entry level field, which makes it tricky to break in to. Main advice for how I got into the field is kinda multilayered, but most importantly is going to be either having certs or demonstrating a passion for the field outside of school. Second is meeting people who are already in companies that are hiring. During my last year in college, I didn't have any certs as I had no money to pay for the tests lol, but I had a public github, a public HTB account, and some other work outside of school to demonstrate to potential employers that I had a passion for the field beyond bookwork. If I were to recommend a starting point, get some certs under your belt. Sec+ is the obvious go to, but if money is an issue I believe ISC2 has a free certification exam and training you can take for a limited time.
@countcampula25 күн бұрын
<a href="#" class="seekto" data-time="586">9:46</a> The DIA does everything you think the NSA/CIA does. NSA just collects data and pools it, DIA and CIA and everybody else just analyze it. A separate agency deals with satellites and another deals with taking satellite data and turning it into maps.
@SageApocolypse2 ай бұрын
So this is mental outlaws spam account right? Awesome vid
@BlueSquareInWhiteCircle2 ай бұрын
<a href="#" class="seekto" data-time="3206">53:26</a> Pegasus would also be worth a mention🐎
@DJKhalidCryptoАй бұрын
Dude, this is exactly my type of video to watch. Cybersecurity is a passion of mine - as a software engineer. I like the Reddit approach to talking about the lore of cybersecurity haha.
@sirBumpyCaseАй бұрын
they should really get on incorporating 'evil bits' into IP packets.
@Dark00129 күн бұрын
this was sick
@ibrahimmaloum6946Ай бұрын
Do you hava any certifications in cybersecurity, if yes which ones, and what would you recommend?
@7alen7Ай бұрын
Sec+, CySA+, Pentest+, CISSP, OSCP, and AWS cloud foundations - the last I only took because a professor in grad school was willing to pay for it. Honestly, depends on the route you want to take. Sec+ is a solid foundation, and most jobs will require or prefer CISSP at some point, even though that's a more management level cert. If you're blue team, go for CySA+ if you want though it isn't super necessary, and for red team I'd recommend going for OSCP. Pentest+ is ok, but only worth it when they have a beta going on (like right now! only $50!), otherwise I'd go for OSCP, or maybe eJPT if your skills aren't quite there yet. More than anything, certs don't matter if you don't have the skills to back it up. Likewise, if you have 10+ years as a pen-tester then getting sec+ really won't do anything for you. P.S., I know it's a meme at this point, but I wouldn't bother with CEH. It'll get you past HR firewalls, but most technical people know it doesn't mean much, and it's waaay to expensive.
@yuck871Ай бұрын
Cool video! In my experience, thought the PS3 ECDSA 2011 hack was something pretty niche and e.g. the Five Eyes are pretty well known, but maybe it's different for each bubble :D
@ivarcturus8120Ай бұрын
this was an amazing source of entertainment and a resource for my career! w vid
@TopSpeedKertusАй бұрын
<a href="#" class="seekto" data-time="1605">26:45</a> I assume this was simply misspeak, but asymmetric encryption is really only used for the handshake and symmetric key exchange (ECDHE). Once the HTTPS connection is established, it’s all symmetric encryption (AES/ChaCha).
@memetime825429 күн бұрын
<a href="#" class="seekto" data-time="403">6:43</a> is... is that the epcot bgm?
@7alen729 күн бұрын
@memetime8254 you bet your bippy I used the innoventions music loop. RIP old futureworld
@memetime825429 күн бұрын
@@7alen7 I'm glad someone else recognizes how good that loop is. RIP old future world
@JJonBaird26 күн бұрын
I have heard a bunch of every layer of the ice burg as well as a bunch I haven’t heard including on the surface layer
@LoloisKali2 ай бұрын
Hey big guy really good work! Much love to all the great content creators like you. I subscribed ! Sharing the love
@outmoon2965Ай бұрын
Excellent video to listen too I hope to see more long form content like this because you definitely have talent for it
@internettrash512027 күн бұрын
Besides "in Minecraft" there's also "in GTA" but it's mostly used by content creators and twitch streamers to dodge potentially violating terms of service regarding the incitement of criminal acts. In GTA of course.
@woaq448626 күн бұрын
Great video man. As a fellow security worker this was a great listen. Especially the stuff about ICS as I’m interested in pivoting towards industrial defense.
@ciceroalexandar61846 күн бұрын
Never heard of Somali prince scam, even googling will lead me to Nigerian prince.
@7alen76 күн бұрын
@ciceroalexandar6184 yeah that's in the description, I made an oopsie
@TheGreaterVeilАй бұрын
You should make an in depth video on all of the global intelligence agencies. The 5 eyes is really interesting. Maybe go into the CCP, the GRU, etc.
@kaiyuVFX2 ай бұрын
horrendously underrated video
@samexidАй бұрын
Great video! So many rabbit holes to explore from now :D
@ZA-mb5diАй бұрын
Funny that this was recommended to me today
@dojidoj9521Ай бұрын
why
@CYBERNETIC-ANGEL Жыл бұрын
you just earned yourself a new subscriber, keep it up
@PlasmaLanticАй бұрын
you should include DEFCON/Blackhat
@7alen7Ай бұрын
That's the black badge tier, I def should include more about it in the next one lol
@DrMorax6 күн бұрын
No music please. Also, this was very fun to watch :3 minus the music ofc
@speedymemes812719 күн бұрын
Okay so with the Microsoft China thing: The business is segmented. China wings of major US corporations like Microsoft, Apple, etc. all have shell companies incorporated in China. Their networks are not in any way connected to our networks in the rest of the world. Perfect example: Azure China. I think it's run by some Chinese data center company and is isolated from the rest of Azure. Edit: the argument about vulnerabilities is interesting, but then that's a dilemma of whether or not we want to provide the software to them to prod
@TheYoutubeG.O.A.TАй бұрын
Im interested in going into cybersecurity for a job but i dont know much about it, anyone have any good starting tips?
@7alen7Ай бұрын
@@TheKZbinG.O.A.T start learning how networks and IT infrastructure operate. It's really hard to protect or attack something if you aren't sure how it works!
@dotmarsАй бұрын
^ This is the best advice you’ll get. You can’t secure what you don’t understand. I work as an information security officer (ISO) and say this to everyone looking to get into cybersecurity.
@TheItalianGentleman2394Ай бұрын
Going back to school for cyber security and working on certifications. I am also balls deep in the blue team rabbit hole
@RJ_Games0Ай бұрын
I’ve always had an interest in the world of cyber security. It’s just so incredible what can be done! I give props to anyone that can learn this skill because this shit is hard.
@dotmarsАй бұрын
Gotta re-do and add CrowdStrike now.
@7alen7Ай бұрын
Well there go my weekend plans
@dotmarsАй бұрын
@@7alen7 Now we both don’t get to enjoy our weekend :(
@JR-ys7bp2 ай бұрын
Love this man happy to see cybersecurity getting more attention
@Xyx_4126 ай бұрын
Learned a lot about Cybersecurity, nice vid!
@nalcedbrwАй бұрын
you got a new sub and i am also a cyber security expert and like this is a good video
@alejandrodetejas20 күн бұрын
cool video, would be nice if there were useful accompanying graphics as opposed to unrelated gaming.