13 Burst results for "Three Hundred Bits"

"three hundred bits" Discussed on The Black Guy Who Tips Podcast

The Black Guy Who Tips Podcast

04:17 min | 1 year ago

"three hundred bits" Discussed on The Black Guy Who Tips Podcast

"That i own out a woman will you heart is for really everytime. How's the news release of. I am working on something other than game. I just laugh because he's still has taken on other projects in the like it'll be like he's writing a sci fi series for for the sci-fi channel. I'm like all those books back to what you were talking about the video game where he's getting these people on twitter and he's he's telling him to go left. I'm kind of respect it. He'll be like me might daughter riding a pony. Finish your book. You know anyone anything. Yeah he does it. He did his fire. Okay honestly how many shows even get that many good series. let me seasons. He's like no. We have any comments on that outline. Wait a minute. He's ordering from papa. John's this this outline really sweet answer is written on a pizza box. We got fingerprint zone to narrow. It's short them was that when he was okay with whatever decision they made never like. Okay so maybe we have sounds. Yeah whatever yeah that got so many number can i. Can i go now imagine. He has like a penguin umbrella right. That was then starts to spin away. he's like mightier hovering by fusing. Everybody going in the penguins. Sam as he's leaving gravity by arch not mule again stairs happening. One was left sobbing. Pain two hundred and fifteen pounds. Or i believe that's pound so i don't know what that translates to in in american dollars but probably a hell of a quick three hundred bit more okay. So she spent three hundred dollars as she was horrified with a haircut because she thinks she ended up looking like a karen. This haircut a tac user. I carly reboot Shared wait wait. What does he have any. I carly does or she must won't reboot. What an interesting what. I think she got what you wanted to change name. Refound game of thrones final season. And just see what happens about our dagan. What does he finds out she got. She got a superpower. You can bring back any live. Action static shock says ny shared also. Here's the thing if you're crying over at three hundred dollars haircut your attaran era yeah you kinda go back to the salon and speak to the manager. And she did. She went to the manager. Take talk okay Yes she was crying. I don't under- out. I think this may be a generational thing okay. I don't think long talk. I don't think i can ever hold a camera in my face and cry and then finish upload you don't like i don't think i could ever rely. I'm very sad about something i'm crying. Oh my god. This is the worst edit and okay. We're gonna crop some of us. Just watch this night or cut and turned off. Hbo mass someone was just in the dark. It was cyborg. Not saying you know some..

twitter penguins attaran Sam John carly ny Hbo
"three hundred bits" Discussed on Joey's Totally Tech

Joey's Totally Tech

05:04 min | 2 years ago

"three hundred bits" Discussed on Joey's Totally Tech

"Computer Hassard, a work. And it gets harder and harder for the computers on network on the networks to do it over time because there's a limit placed on how much you can get. Yeah. For that, which creates the scarcity which causes go up in value I gotcha. So but yeah, it's basically computers. Mind for these blocks or they're doing these math problem sees the working on these algorithms to find the cryptocurrency. I'm not sure how it is with this digital currency. Honestly. I guess it's backed by their own currency or something there. I don't know if there's any crypto currencies actually backed by gold or anything. So. Yeah. That's basically cryptocurrencies for you right on. All right. So the US Cyber Command and Microsoft as well have disrupted the trick bought botnets. True but as a network of at least a million hijacked computers believed to be run by Russia's speaking criminals using malware to operators of this botnets have stolen sensitive information and infected systems with ransomware. This same botnets was used to attack a healthcare provider with ransomware and September. The US Cyber Command recently mounted an operation which interrupted the track bots, botnets operations, several times over the past few weeks. The interruption disconnected infected computers from the servers he is to control them. Microsoft has also disrupted the button it along with multiple partners. The tack giant obtained a court order in years technical action to prevent the button it from either starting new infections or activating dormant ransomware Microsoft was concerned that the track operators would use the botnets to disrupt the imminent US electric through. So you think the election is in jeopardy of being interrupted. I sure hope not but we will see what happens That would be really bad. If you go on election day in vote and suddenly they want like three hundred bit wind because ransomware has attacked the voting machine. But I think. They tried to keep the voting machines, offline an only connect them. When it's time to up load the balance. Yeah I mean that's true. But you know I guess there's no such thing as a perfect system. So yeah, there's not a perfect system. US Army trials, augmented reality goggles for dogs. The US Army unveiled augmented reality goggles which are designed for combat dogs to let them receive orders at a distance soldiers normally director dollars using hand signals or laser pointers requiring the handler to be close by using the AR goggles allows them to be directed via visual indicators in the handler is able to see what the dog sees through a video feed. Military dogs have already been trained to wear goggles as protection. Though the product is in its early stages, the results were looking promising. I don't know I'm an animal lover Yeah I almost feel like it's animal away and I get the reason why we use the combat dogs. But still, I I hate to see them. Being used like that honestly, a man freedom isn't free even for dogs I guess you're right about that. So the Pentagon wants Elon musk to transport cargo around the earth in an hour. The Pentagon contacted space x to develop rockets that can deliver packages around the planet and under an hour the US military is very good at moving troops, weapons and supplies quickly. They were using C seventeen transport planes, but these are no longer be made. The partnership allows space x to keep the rights of the patents developed during the research. There's no timeline for completion of the project. SPACEX king with the military I mean I would be surprised that they weren't getting and that with the military honestly I mean they already work with the government on other things I work with NASA. So why wouldn't it be? Why would they be in bed with military? Yeah. I mean this government contracts usually pretty large though yeah, definitely. So I mean that's no surprise to me So yeah. Being able to. Shut out cargo that quickly via rockets that's going to be really big thing I. Think. Sounds.

US Microsoft ransomware US Army SPACEX Pentagon Elon musk Russia director NASA
"three hundred bits" Discussed on Creative Innovators with Gigi Johnson

Creative Innovators with Gigi Johnson

03:40 min | 2 years ago

"three hundred bits" Discussed on Creative Innovators with Gigi Johnson

"This ten Watt College Station in University Heights Ohio. And I met some of the Promo guys and I met some DJ's from other stations and I met this Guy Billy Bass Billy adopted me. He liked me and we ended up hanging out a lot heaters, guys at Columbia records and organic. Frankly Oh, who went on to manage Michael Jackson and Steve Popovich. Iran Colombia, again, he Martin looney became like my stepparents and they got a job at Columbia records. I ended up living in Boston, eventually for Warner Brothers, I'm skipping a bunch of stuff but I ended up going into artist development moving to Boston and Boston, was a real little tech community I started going to the Boston commuting store and I met the people that advent speakers and the people that DB X., which was the competitor to Dolby. Star. Vice Reduction. and. It was culminated in then moving to Los Angeles and ending up in nineteen eighty two. On a workgroup between Atari Warner, music group and Hewlett Packard. Looking at what the future of digital would be. At Eighty two, there was no internet There was Internet web that was not until ninety four a motive at that point was three hundred Baud, which is like three hundred bits as opposed to five million megabits are whatever I mean. Basically, it was literally took his long descendant emails it does to send the movie now. Sixteen K Computer whenever but we sat in meetings over a year talking about. Streaming, downloading, burning CD's at a time when a CD burner cost twenty, thousand dollars and a blank disk cost one hundred bucks. But we knew it eventually would come down the pricing. This would all be manageable. But we started talking about. And it's always sounds like it's a boast but it isn't it was under guiding Stan Cornyn on review if you're familiar with them at all, but he led this group. We talked about I'd say ninety percent about what's happening now yeah we talked about creating playlist. We talked about creating mix. The CD was coming out in eighty three about a year later, and we're talking about wants to CDs adopted as the music listening platform and LASERDISC had already come out and seventy nine when video and audio or all digital what will people? WanNa do? We're talking the time where there's no high speed Internet, a computer is a four megahertz computer four point seven, seven Megahertz Not Gigahertz there is sixteen K of memory and you're storing things on cassettes. But we knew the bandwidth would come the storage would come when the platforms would eventually arrive. So in a typical long winded answer for me. I've been waiting for the mainstreaming of all this stuff since literally eighty, two, eighty, three, eighty, four are then ended up at Phillips producing music CD ROMs and Phillips perfected the not perfected the platform but a perfected the implementation of 'em beg. So, in ninety three, we were doing 'em one movies. We'd licensed every title from paramount pictures. And so instead of a DVD which is a movie on a disk blueberry were would five movies on a disk 'em beg one was a a larger size encoding format, but you could get a half a movie on a disk. So you had two discs per movie..

Boston Billy Bass Billy Columbia records Steve Popovich Stan Cornyn Watt College Station Hewlett Packard Warner Brothers Atari Warner Phillips DJ Dolby University Heights Ohio Los Angeles Michael Jackson Martin looney Iran Colombia
"three hundred bits" Discussed on WCBM 680 AM

WCBM 680 AM

06:19 min | 2 years ago

"three hundred bits" Discussed on WCBM 680 AM

"Our website that's commanded dot com of course and over on the right hand side there's a link that says be a caller just fill that out and Mandy our show runner producer will get back with you we'll schedule you right after all right by now you've heard of ransomware attacks that take over computers of people and big businesses and small businesses and hospitals in cities and towns and government agencies and just about anywhere else that you can think of in ransomware attacks are up forty one percent over the last year criminals plant malicious software that encrypts all the files on the victim's computers unless the victim as a backup you we talk about that the victim also has to pay the criminal money in big goin to get the files back hands where the term ransomware comes into play but what if you didn't have to pay the ransom more have the money to pay even if you wanted to pay I mean even the FBI has seven times you know you might want to pay this in about seventy percent of the people actually will pay to get their files back and that's where this knight in shining software armor just swoops in a young amazing ma'am anyway Michael Gillespie swoops in to help you there about a thousand different types of ransomware out there and Michael works at night and his days off to come up with software that lets you off the hook now here's the deal Michael's decryption tools are free that's right you don't even have to pay for these tools of Michael such a pleasure to have you here on the camp commander show listener line what's the biggest change that you've seen in ransomware since you started out I guess as our nation's Clark Kent happy to be here so probably the biggest thing I've seen in the last few years especially has been a big shift for better or for worse the bad guys are really going hard core after businesses before it was just a wild west back and you know between twenty thirteen and twenty sixteen one ransomware was really getting in there and I was getting involved and it's just anyone and everyone you know lowest hanging fruit gets gets hits whether it's at home or home person or you know business but now they're the last two years especially they've been shifting to really hitting big target businesses governments and then they're like oh make more money with me they are making more money off of that instead of saying what is the average home is it like three hundred bit coin or is it more than that now who three hundred quite a bit three maybe three hundred dollars dollars yeah I get mixed up too I mean yeah most of the ones that target home users are between three hundred maybe twelve hundred dollars and then of course you see the businesses they could get you know hit up for between three thousand to five I just saw a like a thirty like nails coaster six digit numbers yeah it's just it's getting crazy well you know for hospital gets it I mean you know they don't have a lot of choices and some businesses and governments I mean it's like you know so what we gotta do to get our files back so it used to be a maybe it's still the case Michael where you'd get a fishing email and you click on it or somebody would send you guys like extortion type email say you know everything's gonna be locked down unless you pay us and because we saw you wanna video webcam or what have you is it still hitting businesses and consumers that way yeah definitely that is a very large part of how a lot of businesses get kind of a compromise in the first place is those phishing emails it's a you know it's still the weakest link it's easier for you know targeting something there where someone H. R. just opened a word document and it just it just gets the first foot hole into their network and then it just goes from there so how difficult is it to figure out how to decrypt the encryption without having to pay them the money to aid to get the unlock key how long does a Tom that yeah that and that of course really varies and of course that I have to put a disclaimer I can't decrypt everything you know it's it's it's always reliant on the criminals making a mistake whether it's they don't use very good cryptography they don't use it correctly they don't use it at all had several instances of that so I mean I've had I've had some ransomware that birth from the time I get a hold of it and test it out to actually releasing a tool could be ten minutes if it's like a really really stupid mistake what that's amazing and then you have all these tools of people we're if we are going to lead to them recommended a calm but you have all these tools that are for free and I read that you're you and your young wife that you live in a modest two bedroom home that you purchase for a hundred and sixteen thousand dollars why don't you charge for any of these tools I mean even if it was five or ten dollars pretty much I believe that everyone should have access to such tools if it's feasible I mean there's there's cases where I do have to have it behind a company I work with if it's like a more intricate working but for like home users I do help for free just get out of moral principle I don't want to take advantage of those being taken advantage of already well that's so nice of you so what kind what advice do you have for someone who does get hit with ransomware which they do first I would say first thing is that as cliche as it sounds don't panic freak out yeah because the number one minute and will be probably the two biggest mistakes that people can make when they get hit by ransomware one is freaking out and just shutting everything off and deleting everything because if you delete that you know you you your intuition is I got hit by Mao where I want to delete the malware and they run into buyer scans and delete it well sometimes that makes it harder for me to figure out whether I might have been able to help maybe that malware had you know I have to be a look at it the doctor has to know what you drank from under the sink you know whether he can help you you know exactly and thank you so much for joining us Michael you're doing such incredible work keep it up you're very appreciated we're so glad that you're here again we put links to Michael's twos over at our website.

Mandy producer
"three hundred bits" Discussed on KTLK 1130 AM

KTLK 1130 AM

06:27 min | 2 years ago

"three hundred bits" Discussed on KTLK 1130 AM

"A one triple eight eight to five fifty to fifty four is a weighted joint is a just a quick reminder is that if you like to schedule a time to speak with me here on the show really easy to do just head over to our website that's commanded dot com of course and over on the right hand side there's a link that says be a caller just fill that out and Mandy our show runner producer will get back with you we'll schedule you right after all right by now you've heard of ransomware attacks that take over computers of people and big businesses and small businesses and hospitals in cities and towns and government agencies and just about anywhere else that you can think of in ransomware attacks are up forty one percent over the last year criminals plant malicious software that encrypts all the files on the victim's computers unless the victim as a backup you we talk about that the victim also has to pay the criminal money in bit coin to get the files back hands where the term ransomware comes into play but what if you didn't have to pay the ransom or have the money to pay even if you wanted to pay I mean even the FBI has said times you know you might want to pay this and about seventy percent of people actually will pay to get their files back and that's where this knight in shining software armor just swoops in a young amazing man William Michael Gillespie swoops in to help you there about a thousand different types of ransomware out there and Michael works at night in his days off to come up with software that lets you off the hook now here's the deal Michael's decryption tools are free that's right you don't even have to pay for these tools of Michael such a pleasure to have you here on the camp commander show listener line what's the biggest change that you've seen in ransomware since you started out I guess as our nation's Clark Kent happy to be here so probably the biggest thing I've seen in the last few years especially has been a big shift for better or for worse the bad guys are really going hard core after businesses before it was just a wild west back and you know between twenty thirteen to twenty sixteen one ransomware was really getting in there and I was getting involved in is just anyone and everyone you know lowest hanging fruit gets gets hits whether it's at home or home person or you know business but now they're the last two years especially they've been shifting to really hitting big target businesses governments they make more money related let me see I made more money off of that instead of say what is the average home is it like three hundred bit coin or is it more than that now who three hundred quite a bit three maybe three hundred dollars dollars yeah I get mixed up too I mean yeah most of the ones that target home users are between three hundred maybe twelve hundred dollars and then of course you see the businesses they could get you know hit up for between three thousand to five I just saw it like a thirty like nails closer six digit numbers yeah it's just it's getting crazy well you know for hospital gets it I mean you know they don't have a lot of choices some businesses and governments I mean it's like you know so what are we going to do to get our files back so it used to be in maybe it's still the case Michael where you get a fishing email and you click on it or somebody would send their young like extortion type email say you know everything's gonna be locked down unless you pay us and because we saw you wanna video webcam or what have you is it still hitting businesses and consumers that way yeah definitely that is a very large part of how a lot of businesses get kind of a compromise in the first place is those phishing emails it's a you know it's still the weakest link it's easier for you know targeting something there where someone H. R. just opened a word document and it just it just gets the first foot hole into their network and then it just goes from there so how difficult is it to figure out how to decrypt the encryption without having to pay them the money today to get the unlock key how long does a Tom that yeah that that of course really varies on a course that I have to put a disclaimer I can't decrypt everything you know it's it's always reliant on the criminals making a mistake whether it's they don't use very good cryptography they don't use it correctly they don't use it at all had several instances of that so I mean I've had I've had some ransomware that birth from the time I get a hold of it and test it out to actually releasing a tool could be ten minutes if it's like a really really stupid mistake what that's amazing and then you have all these tools of people we're we're we're gonna link to them recommended a calm but you have all these tools that are for free and I read that you're you and your young wife that you live in a modest two bedroom home that you purchased four hundred and sixteen thousand dollars why don't you charge for any of these tools I mean even if it was five or ten dollars I'm pretty much I believe that everyone should have access to such tools if it's feasible I mean there's there's cases where I do have to have it behind a company I work with if it's like a more intricate working but for like home users I do help for free just get out of moral principle I don't want to take advantage of those being taken advantage of already it's so nice to you so what kind what advice do you have for someone who does get hit with ransomware which they do first I would say first thing is that as cliche as it sounds don't panic freak out yeah because the number one it will be probably the two biggest mistakes that people can make when they get hit by ransomware one is freaking out and just shutting everything off and deleting everything because if you delete that you know you you your intuition is I got hit by Mao where I want to delete the malware and they run into buyer scams and delete it well sometimes that makes it harder for me to figure out whether I might have been able to help maybe that malware had you know I have to be a look at it the doctor has to know what you drank from under the sink you know whether he can help you you know exactly and thank you so much for joining us Michael you're doing such incredible work keep it up you're very appreciated we're so glad that you're here again we put links.

"three hundred bits" Discussed on KHVH 830AM

KHVH 830AM

06:19 min | 2 years ago

"three hundred bits" Discussed on KHVH 830AM

"A one triple eight eight to five fifty to fifty four is a weighted joint is a just a quick reminder is that if you like to schedule a time to speak with me here on the show really easy to do just head over to our website that's commando dot com of course and over on the right hand side there's a link that says be a caller just fill that out and Mandy our show runner producer will get back with you we'll schedule you right after all right by now you've heard of ransomware attacks that take over computers of people and big businesses and small businesses and hospitals in cities and towns in government agencies and just about anywhere else that you can think of in ransomware attacks are up forty one percent over the last year criminals plant malicious software that encrypts all the files on the victim's computers unless the victim as a backup you we talk about that the victim also has to pay the criminal money in big goin to get the files back hands where the term ransomware comes into play but what if you didn't have to pay the ransom more have the money to pay even if you wanted to pay I mean even the FBI has seven times you know you might want to pay this and about seventy percent of the people actually will pay to get their files back and that's where this knight in shining software armor just swoops in a young amazing man buddy Michael Gillespie swoops in to help you are there about a thousand different types of ransomware out there Michael works at night and his days off to come up with software that lets you off the hook now here's the deal Michael's decryption tools are free that's right you don't even have to pay for these tools of Michael such a pleasure to have you here on the camp commander show listener line what's the biggest change that you've seen in ransomware since you started out I guess as our nation's Clark Kent happy to be here so probably the biggest thing I've seen in the last few years especially has been a big shift for better or for worse the bad guys are really going hard core after businesses before it was just a wild west back and you know it between twenty thirteen and twenty sixteen one ransomware was really getting in there and I was getting involved and is just anyone and everyone you know lowest hanging fruit gets gets hits whether it's at home or home person or you know business but now they're the last two years especially the been shifting to really hitting big target businesses governments and then there's a make more money related let me they made more money off of that instead of say what is the average home is like three hundred bit coin or is it more than that now crew three hundred coins of it three maybe three hundred dollars dollars yeah I get mixed up too I mean yeah most of the ones that target home users are between three hundred maybe twelve hundred dollars and then of course you see the businesses they could get you know hit up for between three thousand to five I just saw a like a thirty like a Nelson Costa six digit numbers yeah it's just it's getting crazy well you know for hospital gets hit I mean you know they don't have a lot of choices and some businesses and governments I mean it's like you know so what we gotta do to get our files back so it used to be a maybe it's still the case Michael where you'd get a fishing email and you click on it or somebody would send you guys like extortion type email say you know everything's gonna be locked down unless you pay us and because we saw you wanna video webcam or what have you is it still hitting businesses and consumers that way yeah definitely that is a very large part of how a lot of businesses get kind of a compromise in the first place is those phishing emails it's a you know it's still the weakest link it's easier for you know targeting something there where someone in HR just opened a word document and it just it just gets the first foot hole into their network and then it just goes from there so how difficult is it to figure out how to decrypt the encryption without having to pay them the money to aid to get the unlock key how long does a Tom that yeah that that of course really varies on a course that I have to put a disclaimer I can't decrypt everything you know it's it's it's always reliant on the criminals making a mistake whether it's they don't use very good cryptography they don't use it correctly they don't use it at all had several instances of that so I mean I've had I've had some ransomware that Burr from the time I get a hold of it and test it out to actually releasing a tool could be ten minutes if it's like a really really stupid mistake what that's amazing and then you have all these tools of people we're it we're gonna link to them recommended a calm but you have all these tools that are for free and I read that you're you and your young wife that you live in a modest two bedroom home that you purchased four hundred and sixteen thousand dollars why don't you charge for any of these tools I mean even if it was five or ten dollars I'm pretty much I believe that everyone should have access to such tools if it's feasible I mean there's there's cases where I do have to have it behind a company I work with if it's like a more intricate working but for like home users I do help for free just get out of moral principle I don't want to take advantage of those being taken advantage of already well that's so nice of you so what kind what advice do you have for someone who does get hit with ransomware which they do first I would say first thing is that as cliche as it sounds don't panic freak out yeah because the number one minute and will be probably the two biggest mistakes that people can make when they get hit by ransomware one is freaking out and just shutting everything off and deleting everything because if you delete that you know you you your intuition is I got hit by Mao where I want to delete the malware and they run into buyer scans and delete it well sometimes that makes it harder for me to figure out whether I might have been able to help maybe that malware had you know I have to be a look at it the doctor has to know what you drank from under the sink you know whether he can help you you know exactly and thank you so much for joining.

"three hundred bits" Discussed on KNST AM 790

KNST AM 790

04:50 min | 2 years ago

"three hundred bits" Discussed on KNST AM 790

"Open love to hear from a one triple eight eight to five fifty to fifty four as a way to join us in just a quick reminder is that if you'd like to schedule a time to speak with me here on the show really easy to do just head over to our website that's commanded dot com of course and over on the right hand side there's a link that says be a caller just fill that out and Mandy our show runner producer will get back with you we'll schedule you right after all right by now you've heard of ransomware attacks that take over computers of people and big businesses and small businesses and hospitals in cities and towns and government agencies and just about anywhere else that you can think of in ransomware attacks are up forty one percent over the last year criminals plant malicious software that encrypts all the files on the victim's computers unless the victim as a backup you we talk about that the victim also has to pay the criminal money in big goin to get the files back hands where the term ransomware comes into play but what if you didn't have to pay the ransom more have the money to pay even if you wanted to pay I mean even the FBI has seven times you know you might want to pay this in about seventy percent of the people actually will pay to get their files back and that's where this knight in shining software armor just swoops in a young amazing ma'am anyway Michael Gillespie swoops in to help you are there about a thousand different types of ransomware out there Michael works at night in his days off to come up with software that lets you off the hook now here's the deal Michael's decryption tools are free that's right you don't even have to pay for these tools of Michael such a pleasure to have you here on the camp commander show listener line what's the biggest change that you've seen in ransomware since you started out I guess as our nation's Clark Kent happy to be here so probably the biggest thing I've seen in the last few years especially has been a big ship for better or for worse the bad guys are really going hard core after businesses before it was just a wild west back and you know between twenty thirteen to twenty sixteen one ransomware was really getting in there and I was getting involved and is just anyone and everyone you know lowest hanging fruit gets gets hit whether it's at home or home person or you know business but now they're the last two years especially they've been shifting to really hitting big target businesses governments and then there they go make more money related maybe they are making more money off of that instead of say what is the average home is it like three hundred bit coin or is it more than that now who three hundred quite a bit three maybe three hundred dollars dollars yeah I get mixed up too I mean yeah most of the ones that target home users are between three hundred maybe twelve hundred dollars and then of course you see the businesses they could get you know hit up for between three thousand to five I just saw like a thirty like now because their six digit numbers yeah it's just it's getting crazy well you know for hospital gets hit I mean you know they don't have a lot of choices some businesses and governments I mean it's like you know so what we gotta do to get our files back so it used to be in maybe it's still the case Michael where you'd get a fishing email and you click on it or somebody would send their young like extortion type email stay you know everything's gonna be locked down unless you pay us and because we saw you wanna video webcam or what have you is it still hitting businesses and consumers that way yeah definitely that is a very large part of how a lot of businesses get kind of a compromise in the first place is those phishing emails it's a you know it's still the weakest link it's easier for you know targeting something there where somewhere in H. R. just opened a word document and it just it just gets the first foot hole into their network and then it just goes from there so how difficult is it to figure out how to decrypt the encryption without having to pay them the money today to get the unlock key how long does a Tom that yeah that that of course really varies on a course that I have to put a disclaimer I can't decrypt everything you know it's it's always reliant on the criminals making a mistake whether it's they don't use very good cryptography they don't use it correctly they don't use it at all had several instances of that so I mean I've had I've had some ransomware that Burr from the time I get a hold of it and test it out to actually releasing a tool could be ten minutes if it's like a really really stupid mistake you know what that's amazing and then you have all these tools of people we're it.

"three hundred bits" Discussed on KOA 850 AM

KOA 850 AM

04:51 min | 2 years ago

"three hundred bits" Discussed on KOA 850 AM

"Open love to hear from a one triple eight eight to five fifty to fifty four as a way to join us in just a quick reminder is that if you'd like to schedule a time to speak with me here on the show really easy to do just head over to our website that's commanded dot com of course and over on the right hand side there's a link that says be a caller just fill that out and Mandy our show runner producer will get back with you we'll schedule you right after all right by now you've heard of ransomware attacks that take over computers of people and big businesses and small businesses and hospitals in cities and towns and government agencies and just about anywhere else that you can think of in ransomware attacks around forty one percent over the last year criminals plant malicious software that encrypts all the files on the victim's computers unless the victim as a backup you we talk about that the victim also has to pay the criminal money in big goin to get the files back hands where the term ransomware comes into play but what if you didn't have to pay the ransom or have the money to pay even if you wanted to pay I mean even the FBI has said times you know you might want to pay this and about seventy percent of the people actually will pay to get their files back and that's where this knight in shining software armor just swoops in a young amazing man buddy Michael Gillespie swoops in to help you there about a thousand different types of ransomware out there Michael works at night and his days off to come up with software that lets you off the hook now here's the deal Michael's decryption tools are free that's right you don't even have to pay for these tools of Michael such a pleasure to have you here on the camp commander show listener line what's the biggest change that you've seen in ransomware since you started out I guess as our nation's Clark Kent happy to be here so probably the biggest thing I've seen in the last few years especially has been a big shift for better or for worse the bad guys are really going hard core after businesses before it was just a wild west back and you know between twenty thirteen to twenty sixteen one ransomware was really getting in there and I was getting involved and it is just anyone and everyone you know lowest hanging fruit gets gets hits whether it's at home or home person or you know business but now they're the last two years especially the been shifting to really hitting big target businesses governments your morning dative let me they made more money off of that instead of say what is the average home is it like three hundred bit coin or is it more than that now who three hundred coins of it three maybe three hundred dollars dollars yeah I get mixed up too I mean yeah most of the ones that target home users are between three hundred maybe twelve hundred dollars and then of course you see the businesses they could get you know hit up for between three thousand to five I just saw a like a thirty like Nelson co says six digit numbers yeah it's just it's getting crazy well you know for hospital gets hit I mean you know they don't have a lot of choices and some businesses and governments I mean it's like you know so what we gotta do to get our files back so it used to be a maybe it's still the case Michael where you get a fishing email and you click on it or somebody would send you guys like extortion type email say you know everything's gonna be locked down unless you pay us and because we saw you wanna video webcam or what have you is it still hitting businesses and consumers that way yeah definitely that is a very large part of how a lot of businesses get kind of a compromise in the first place is those phishing emails it's a you know it's still the weakest link it's easier for you know targeting something there where someone H. R. just opened a word document and it just it just gets the first foot hole into their network and then it just goes from there so how difficult is it to figure out how to decrypt the encryption without having to pay them the money to pay to get the unlock key how long does a Tom that yeah that that of course really varies on a course that I have to put a disclaimer I can't decrypt everything you know it's it's always reliant on the criminals making a mistake whether it's they don't use very good cryptography they don't use it correctly they don't use it at all had several instances of that so I mean I've had I've had some ransomware that brick from the time I get a hold of it and test it out to actually releasing a tool could be ten minutes if it's like a really really stupid mistake what that's amazing and then you have all these tools of people we're we're gonna link to them recommended.

"three hundred bits" Discussed on SuperTalk WTN 99.7

SuperTalk WTN 99.7

06:29 min | 2 years ago

"three hundred bits" Discussed on SuperTalk WTN 99.7

"T. mobile unlimited Lister lines open love to hear from a one triple eight eight to five fifty to fifty four as a way to join as a just a quick reminder is that if you'd like to schedule a time to speak with me here on the show really easy to do just head over to our website that's commando dot com of course and over on the right hand side there's a link that says be a caller just fill that out and Mandy our show runner producer will get back with you we'll schedule you right after all right by now you've heard of ransomware attacks that take over computers of people and big businesses and small businesses and hospitals in cities and towns and government agencies and just about anywhere else that you can think of in ransomware attacks around forty one percent over the last year criminals plant malicious software that encrypts all the files on the victim's computers unless the victim as a backup you we talk about that the victim also has to pay the criminal money in big goin to get the files back hands where the term ransomware comes into play but what if you didn't have to pay the ransom or have the money to pay even if you wanted to pay I mean even the FBI has seven times you know you might want to pay this in about seventy percent of the people actually will pay to get their files back and that's where this knight in shining software armor just swoop said a young amazing man William Michael Gillespie swoops in to help you there about a thousand different types of ransomware out there Michael works at night and his days off to come up with software that lets you off the hook now here's the deal Michael's decryption tools are free that's right you don't even have to pay for these tools of Michael such a pleasure to have you here on the camp commander show listener line what's the biggest change that you've seen in ransomware since you started out I guess as our nation's Clark Kent happy to be here so probably the biggest thing I've seen in the last few years especially has been a big shift for better or for worse the bad guys are really going hard core after businesses before it was just a wild west back and you know between twenty thirteen to twenty sixteen one ransomware was really getting in there and I was getting involved and it's just anyone and everyone you know lowest hanging fruit gets gets hit whether it's at home or home person or you know business but now they're the last two years especially they've been shifting to really hitting big target businesses governments and then they're like oh make more money later let me they are making more money off of that instead of say what is the average home is it like three hundred bit coin or is it more than that now who three hundred quite a bit three maybe three hundred dollars dollars yeah I get mixed up too I mean yeah most of the ones that target home users are between three hundred maybe twelve hundred dollars and then of course you see the businesses they could get you know hit up for between three thousand to five I just saw it like a thirty like nails closer six digit numbers yeah it's just it's getting crazy well you know for hospital gets hit I mean you know they don't have a lot of choices and some businesses and governments I mean it's like you know so what we gotta do to get our files back so it used to be a maybe it's still the case Michael where you'd get a fishing email and you click on it or somebody would send their young like extortion type email say you know everything's gonna be locked down unless you pay us and because we saw you wanna video webcam or what have you is it still hitting businesses and consumers that way yeah definitely that is a very large part of how a lot of businesses get kind of a compromise in the first place is those phishing emails it's a you know it's still the weakest link it's easier for you know targeting something there where someone H. R. just opened a word document and it just it just gets the first foot hole into their network and then it just goes from there so how difficult is it to figure out how to decrypt the encryption without having to pay them the money to aid to get the unlock key how long does a Tom that yeah that that of course really varies on a course that I have to put a disclaimer I can't decrypt everything you know it's it's it's always reliant on the criminals making a mistake whether it's they don't use very good cryptography they don't use it correctly they don't use it at all had several instances of that so I mean I've had I've had some ransomware that birth from the time I get a hold of it and test it out to actually releasing a tool could be ten minutes if it's like a really really stupid mistake what that's amazing and then you have all these tools of people we're it we're gonna link to them recommended a calm but you have all these tools that are for free and I read that you're you and your young wife that you live in a modest two bedroom home that you purchase for a hundred and sixteen thousand dollars why don't you charge for any of these tools I mean even if it was five or ten dollars I'm pretty much I believe that everyone should have access to such tools if it's feasible I mean there's there's cases where I do have to have it behind a company I work with if it's like a more intricate working but for like home users I do help for free just kind of moral principle I don't want to take advantage of those being taken advantage of already well it is so nice is so what kind what advice do you have for someone who does get hit with ransomware which they do first I would say first thing is that as cliche as it sounds don't panic freak out yeah because the number one minute and will be probably the two biggest mistakes that people can make when they get hit by ransomware one is freaking out and just shutting everything off and deleting everything because if you delete that you know you you your intuition is I got hit by Mao where I want to delete the malware and they run into buyer scams and delete it well sometimes that makes it harder for me to figure out whether I might have been able to help maybe that malware had you know I have to be a look at it the doctor has to know what you drank from under the sink you know whether he can help you you know exactly and thank you so much for joining us Michael you're doing such incredible work keep it up you're very appreciated we're so glad that you're here again we're put links.

"three hundred bits" Discussed on TechStuff

TechStuff

07:32 min | 2 years ago

"three hundred bits" Discussed on TechStuff

"Labs introduced the one. Oh, three in the early nineteen sixties and the one. Oh, three modem had a transmission speed of three hundred Baud that's three hundred bits per second. Now that speed it would take you nearly eight hours to transfer file. That was one megabyte in size wolf. Now, of course, most files of the time were significantly smaller than one megabyte, even so a single character you know a letter or a number or a symbol like you know a an Tarot Bang or a dollar sign, or anything like that, it would require eight bits to encode. That's one byte so three hundred. Hundred Baud Modem could send about thirty seven characters per second, technically thirty seven and a half, but half a characters meaningless, unless you're a big fan of the twilight series or something. Meanwhile, a scientist named Robert Vite Brecht was working on technology to help deaf people communicate using telephone lines vite Braxton himself was born deaf, and is innovation used a device called an acoustic coupler, and this was a third party perfil that. Would have likely shot down before that court decision made from a few years earlier, and that totally weakened eighteen case, the acoustic coupler was a special cradle that could hold a telephone handset. They gotta remember eighteen owned all the telephones so pretty much. All the telephones were the exact same form factor, so it's really easy to build a one-size-fits-all referral because he knew what the phone we're going to be like, so the handset would essentially go into two kinds of rubber cups, and you would put the handsets speaker to go against the couplers microphone, and the handsets microphone would go up against the couplers speaker. Vite Brecht hooked us up to a typewriter. It was an extension of the teletype. Idea talked about earlier and here's how it worked now. Both of them have tele typewriter machines with acoustic couplers, so they each put their phones handset into those acoustic couplers connecting the whole system together. Person, one would type A message on their typewriter, and that would then send a signal to the acoustic coupler which would convert that signal into. And the audio transfer over the phone line just as it would, if they were having a voice conversation to person number twos handset, which is in you know another acoustic coupler. The audio plays out over the handsets speaker. The Acoustic coupler picks up. That audio converts into another signal which goes to the typewriter, and then Prince, the message that person number one had originally tight. What made this invention more useful was the creation of tele typewriter relay services, an entire language even developed around it, because communication could only go one way at a time similar to using a walkie talkie or a CB radio. So you have certain phrases that indicate when you are done speaking, you know like with walkie-talkies. You might say over to indicate you're done. The Acoustic coupler would allow for a wider adoption of modems and also allowed other companies besides a t and t the opportunity to make modems themselves at all. The modems were not directly connecting into the phone networks. Nothing was getting plugged into the phone network itself. They were just sending audio signals over telephones actual telephone handsets. They just happen to be a carrier. Carrier Signal for digital information as opposed to a voice telephone call. It was a great work around now. If you've seen the classic nineteen eighty s film wargames, which stars Matthew Broderick as a precocious hacker, you've seen an acoustic coupler because Broderick uses one puts his phone into is phone handset into an acoustic coupler when he hacks into systems in that film. Over the years, companies made more advanced modems, but the customer base was still pretty limited in the sixties and Seventies. Because we have to remember, it wasn't until the mid nineteen seventies that personal computers were even a thing so typically so really we were talking about research facilities, a few companies, some government and military offices, and mostly they were just talking to branches of themselves. They weren't cross talking because there wasn't really a network set up yet. Some other important events that helped establish the foundation for modems include the creation of a standard called R. Two thirty two are s stands for recommended standard. This was another technology being developed around the same time as the evolution of modems so early nineteen sixties. It's a standard for serial communication for the transmission of information, and serial communication means that this method sends data one bit at a time in sequence as opposed to parallel communication, which you could send data in parallel channels all at the same time by establishing a standard companies didn't have to invent a new method for a computer to send data to some other devices drum roll. Please a modem. By the time, personal computers were coming around the RS. Two thirty two standard was well established, and it was pretty typical defined at least one serial port on a PC. These could connect to things like modems, printers computer mice. Meanwhile, a group of scientists with the backing of the US Department of Defense. We're hard at work. Creating a different set of standards, these standards would set the rules for how computers could send information across a network you know. How would those messages take form? How would you do error correction? Sure the entire message gets through. These rules would lead to the formation of the arpanet, a sort of predecessor to the Internet, and then further go on to evolve into the rules that guide data transmission across the Internet itself on the telephone infrastructure front here in the United, states, the government began to pass regulations on the industry, forcing at and T. to make concessions to consumers. Ultimately later on the government would break at and T. up into several regional companies. Because of that monopoly. I talked about earlier and. Later. Most of these would just coalesce t one thousand like back into a t and T, but that's a different story. One of those regulations which was passed in the nineteen sixties had to do with the creation of the RJ eleven connector also known as the phone Jack. Earlier phones were typically hardwired into houses with no jacket. All you could disconnect the phone. It was wired directly into the wall. You couldn't plug anything else into the phone line. Because the other end of the phone line was inside the telephone, there was no access to it but the RJ eleven. Jack meant you could do that. You could detach the the wire from phone and put it into something else like a modem now it was introduced in the nineteen sixties, but it wasn't until the US government. Government passed regulations requiring their implementation in the mid nineteen seventies, so it took a decade before they were actually starting to really be implemented on spread basis..

Robert Vite Brecht scientist US Matthew Broderick US Department of Defense Jack Prince Braxton United
"three hundred bits" Discussed on News 96.5 WDBO

News 96.5 WDBO

05:25 min | 3 years ago

"three hundred bits" Discussed on News 96.5 WDBO

"Can find the ways that you can get involved if you wish find a way to contact heads of the departments if you have any questions if you're interested in and turning if you just simply want to come visit we're very proud of what we do and we we always love when somebody from the community goes that really touches my heart can I see for myself we love having those moments and we're just you know lean and get to know us ask us any questions and especially if if you believe in what we believe in and spread the word because I I think you know it takes a village and we're dealing with we're dealing with these amazing kiddos and I imagine there's some people listening who themselves didn't even realize that you were there and they could use your services yeah one hundred percent eight eight is we have a an amazing network of of of professionals that that were for folks to us but for instance one of the biggest one is is the beta program and that was very unique because it it was once the beta center and it was its own nonprofit organization and it served teen moms and their babies gave them housing gave them schooling gave them an opportunity to continue their education and they they announced they were closing and we thought I mean that's really similar to what we already do and this was a huge thing for for a lot of young women in our community and we very very quickly where it was able to strike a partnership with Orange County public schools and keep it open but because of because they did initially announced that they closed I think a lot of people still don't know that that program is is still in existence you know it's just part of you know you see kids central Florida which brings up another way that people can help yeah all right well so good talking to you thank you for coming in today thank you this is a lot of fun JP Soto is senior director of marketing and communications for UCP of central Florida I best peril speaking to captain can Japanese the area commander of the salvation army in orange and Osceola counties I want to ask you about two different things today two different ways people can help out in the holidays one is by manning a cattle the other is by having a virtual cattle yeah we've come into the twenty first century how about that so couple of things with our cattle signs this year they were B. apps on there where you can bump your phone on it and for apple pay in for Google play and we also have our jingle jar which you can dip your car credit card in there and pull it out give a five dollar donation and be on your way and we promise we won't send you any letters during the year so we also can staff a cattle for day we have fifty locations publics in Walmart and you can go to register to ring dot com and you can register your family or your group or your team or your Sunday school class and all ring a bell then the very excited about our virtual cattle's so the virtual kills called candles for the future so you can go to our website you can get your own page for your own cattle we're Askin and challenging a thousand different groups families individuals to adopt a cattle and raise five hundred dollars between now and the end of the year and if a thousand people do that and they are successful with their goal that five hundred thousand dollars that will help people in this community all right and that's what you refer to as being the army behind the army when people set up those kettles when we do that together we come together as a community we make the difference that people made in this is money that we use doing the entire year three hundred beds of shelter every night a thousand meals hundred fifty at risk youth being served every day three hundred nineteen elderly and every does faster that happens we will be first on the scene okay once again how do people do it and when is it too late it's never going to be too late so go to salvation army Orlando dot org and you will see you can register to ring there be a banner for that or you can there be another banner for virtual cattle and you can sign up for either one of those or even both of those and you can give hope to people who have lost their way and for everyone who has that memory of being a child who got that bit of change from mom or dad and got to put it in the cattle now's the time to to do that yourself pass by the way that's a great way to teach children the guy back let and children bring in more money so put your children at the candles and let them bring Belfour's and help people who are hungry and people who need help in this community absolutely so why don't you real quickly once again tell people how that money is used that is used for feeding people all through the year a thousand meals a day that is used for three hundred bits of shelter that is used for elderly people that we take care of on our in our complex is a three hundred nineteen apartments hundred fifty at risk youth they get hot meals every day and a lot of training to prevent them from going into homelessness and our pathway of hope that says people back in with dignity and self sustainability and this is to help people in both orange and Osceola yes we are there we actually have many salvation army's in that way about sixty six of them in Florida but I am responsible for orange and Osceola but there's a lot of all of the your listeners all.

"three hundred bits" Discussed on News 96.5 WDBO

News 96.5 WDBO

02:24 min | 3 years ago

"three hundred bits" Discussed on News 96.5 WDBO

"We promise we won't send you any letters during the year so we also can staff a cattle for day we have fifty locations publics and Walmart and you can go to register to ring dot com and you can register your family or your group or your team or your Sunday school class and all ring a bell then the very excited about our virtual cattle's so the virtual kills called candles for the future so you can go to our website you can get your own page for your own cattle we're Askin and challenging a thousand different groups families individuals to adopt a cattle and raise five hundred dollars between now and the end of the year and if a thousand people do that and they are successful with the girl that five hundred thousand dollars that will help people in this community all right and that's what you refer to as being the army behind the army when people set up those K. adults when we do that together we come together as a community we make the difference that people made in this is money that we use to doing the entire year three hundred beds of shelter every night a thousand meals hundred fifty at risk youth being served every day three hundred nineteen elderly and every disaster that happens we will be first on the scene okay once again how do people do it and when is it too late it's never going to be too late so go to salvation army Orlando dot org and you will see you can register to ring there be a banner for that or you can there be another banner for virtual cattle and you can sign up for either one of those or even both of those and you can give hope to people who have lost their way and for everyone who has that memory of being a child who got that bit of change from mom or dad and got to put it in the cattle now's the time to to do that yourself pass by the way that's a great way to teach children the guy back let and children bring in more money so put your children at the candles and let them bring Belfour's and help people who are hungry and people who need help in this community absolutely so why don't you real quickly once again tell people how that money is used that is used for feeding people all through the year a thousand meals a day that is used for three hundred bits of shelter that is used for elderly people that we take care of on our in our complex is a three hundred nineteen apartments hundred fifty at.

Study: Twitter's fake news is largely shared by old conservatives

The Big Biz Radio Show

00:32 sec | 3 years ago

Study: Twitter's fake news is largely shared by old conservatives

"Researchers writing in the journal science examined the Twitter accounts of more than sixteen thousand users during the height of the two thousand sixteen election campaign, they found just sixteen of them spread eighty percent of all the misinformation that was masquerading as news those who did were more likely to be over the age of sixty five and politically conservative. The super shares were active sharing more than three hundred bits of fake information each between August and December the steady reached conclusions. That were similar to one released this month about misinformation spread by Facebook

Twitter Facebook Three Hundred Bits Eighty Percent