10 Matching Annotations
  1. Jun 2021
    1. Steps

      1. Startup or restart the computer
      2. Immediately hold down command-r
      3. Choose Reinstall macOS current version
      4. See the details in the guidelines section

      You may need the password to unlock filevault

      Reinstalling will take a long time. Once it has started leave the computer alone.

    2. Then turn on your Mac and immediately press and hold Command (⌘)-R until you see an Apple logo or other image.

      Step 1

  2. Jul 2020
    1. He’s a practicing designer, writer and founding member of DWFE; a post-disciplinary, semi-fictional design syndicate.

      same idea

    1. Without internet, all we had were textbooks, but we could bring them back to the cell. If you were thinking about how to solve a computer problem, you had to write it all out by hand—which I think was a great exercise, figuring stuff out without the computer. I usually had a computer book with me everywhere I went.

      Coding on paper

  3. Nov 2019
    1. Blocking BEC AttacksAs technology evolves and deep fake AI grows popular, business email compromise (BEC) attacks are growing more common and sophisticated. Payton gave the audience a piece of advice: Do not use your public-facing domain name for moving money. Cybercriminals do their open source intelligence. They know your CEO. They know your CFO. They can figure out who your vendors are and your marketing campaigns. With knowledge gleaned from an Internet search, they have enough to send a social engineering email and transfer money. "Get a domain name that is not your public-facing domain name," Payton said. Get a set of email credentials only for people who are allowed to move money. Tell your bank you're no longer using the public-facing domain name for anything to do with wire transfers and money movement. From there, create a template to be used among employees sending and fulfilling financial requests. Decide on a code word you text to each other that isn't a term shared on social media, Payton advised. This way, a request that doesn't come with a code word will appear suspicious. A large healthcare provider adopted the method, she said – and it has already worked. The same strategy can be used for transferring intellectual property.

      prevention strategies

    1. Toluna Group’s proprietary panel of pre-screened, validated, de-duplicated and well-profiled respondents

      panel

  4. Jul 2019
    1. The SESSION SETUP ANDX RESPONSE message also has an interesting little bitfield called SMB_PARAMETERS.Action. Only the low-order bit (bit 0) of this field is defined. If set, it indicates that the username was not recognized by the server (that is, authentication failed--no such user) but the logon is being allowed to succeed anyway. That's rather odd, eh? What it means is this: If the username (in the AccountName field) is not recognized, the server may choose to grant anonymous or guest authorization instead. Anonymous access typically provides only very limited access to the server. For example, it may allow the use of a limited set of RAP function calls such as those used for querying the Browse Service.

      authentication trivia

    2. Connecting to a server through a NAT (Network Address Translation) gateway is also problematic, since the NAT makes multiple clients appear to be a single client by placing them all behind the same IP address30

      SMB behind NAT

    3. SMB behind NAT

  5. Apr 2019