I agree, but I’m the spirit of the question, do you work in a corporate environment?
I agree, but I’m the spirit of the question, do you work in a corporate environment?
If it makes it any easier, those hundreds of millions of people are going to die anyway, the only tragedy about it is that it’s from something we could technically prevent or mitigate, but most things are like that… Traffic, smoking, guns, unhealthy diet… The climate changing isnt really going to affect the earth, our short sightedness and ignorance will just make lots of areas we can comfortable live in now much less comfortable or unlivable entirely. It’s going to suck, but do what you can with what you have and just the fact that you know enough to care means you have something to offer.
Maybe it helps to understand it when you think of it from the perspective that those $1000 expenses do happen, they’re not just hypothetical. But being able to cope with an event like that leaves you less able to handle a second one, and a third one
Couple that with the fact that I’m the US there is very little financial education so what might be an expected event for one person surprises another. Imagine living with a roommate and not realizing that to move into your own place involves coming up with first and last month rent, deposit, hook up fees, renters insurance, furniture, kitchen supplies, toiletries, etc… None of those should be unexpected, but also why would you expect them if you didn’t happen to run into them before?
Basically no amount of saving accounts for an expense that takes it all, and it’s then followed up by another one right after. And for some people those events are small and happen so quickly you never catch up and now you have late fees and interest and stress.
Well ‘no benefits’ is a bit of a stretch.
The angle formerly known as twitter
it is such a pathetic song…remember that one time that guy did a thing and we just died laughing? remember that? That was cool…
Imagine the suspension of intellect it must take to admit that Russia is willing to pay you push the narrative you are already pushing, or are willing to push, and then considering yourself a victim for doing it.
You weren’t the target, you were the tool.
Second job overnights at a gas station… Pretty much any combination of right/left hand, upside down/mirrored, cursive/text, words forward/letters backwards, etc.
This is a really old message, but if you’re still having the same question i could try to answer, but that kind of message is pretty context dependant. For that specific one, it sounds like your program is trying to access something outside your network, like they have a website they need to access to check for updates or something.
A benign scan could just be looking for an ftp server to connect to or a repeater or relay server of some sort. There are plenty of open services people make available for free and the fact that you would consider it an attack it doesn’t make it one.
At minimum you could be alerted to look for someone attempting to connect to your ftp server with a single basic anonymous authentication vs someone flooding that port with known malicious software attacks, and block the latter across your entire network and effectively ignore the former. Really it seems like you’re advertising your lack of imagination in this context than a legitimate lack of possible uses for spoofing open ports.
Is that supposed to be a smart ass answer?
Well, since you ask, it likely depends on whether they’re humorously encouraging you to look at something from a different angle, or if they’ve just discovered a handful of situations that get a chuckle from people who only encounter it occasionally, them proceed to subject everyone to the same ‘second-think’ ad nauseum.
That’s probably a majority of the point. Falsely report that some interesting ports are open and he’ll spend time on them and potentially trigger alerts or blocks.
Fake open ports aren’t something a normal user would bother with or understand, but with all the tools available in the nefarious side, it makes sense to have options that make their job harder if you’re willing to use them.
At a guess, you might tell the difference between some benign scan and an attempt to actually take advantage of the port, perhaps to use as a trigger to automatically ban an ip address? or a way to divert malicious resources to an easy looking target so they are less available in other areas?
The difference between someone scanning for open ports and someone attacking a port they find open seems significant enough to at least track and watch for patterns… Whether that’s useful for the majority of users or not is rarely why a feature is implemented.
Facts are tiny, but there are a lot of them. Theories are big but only useful the fewer of them there are. Grow oversimplifications, of course, but the more facts a theory can explain, the more successful the theory. Maybe that’s is how they should be framed, theories are never proven, they are only successful or disproven.
That’s why these discussions generally come down to understanding/misunderstanding ‘instincts’. Certain breeds have at least broadly understood instincts when it comes to offensive/defensive postures, and those instincts may never be triggered in their day to day, even year to year, routine…but extrapolating that to mean ‘my little Cuddles would never X if Y happened’ is dangerous and selfish.
Maybe think of it like one of those big walls of post office mailboxes…behind the wall is your computer and an app might be waiting for a message at box 22 or box 45678. You could close all the boxes and nothing could get in, or you could open one or all of them and allow people to deliver messages to them.
If you connect your computer directly to the internet, anyone who knows your IP address could say 'deliver message X to port 22 at ip address <your ip address> and the program watching that box would get the message.
If you put a router in the mix, and multiple computers, the router has the same block of boxes, but if someone sends a message to one of the boxes it just sets there. If you set up ‘forwarding’, sending a message to your ip address gets the message to the router, but if you forward box 22 from your router to a specific computer on your network, then the router takes a message at box 22 on itself and ‘forwards’ it to box 22 on whatever computer you specific (using internal ip addresses).
You could map box 22 on your router to any other box on your computer…like port 22 coming into your router might get sent to port 155 on your computer…this is useful if you don’t want external people just exploring and lazily breaking into your computer using known vulnerabilities. Lots of ports are ‘common’, so an ftp hack on port 22 is easy, and might be ‘slightly’ harder if you tell your computer to actually look for ftp traffic on port 3333 or something.
I know it’s going to last a long time because the old lady said they used it everyday and it still looks practically new