Youtube comments of Patrick Berry (@MundaneGray).

  1. 28000
  2. 781
  3. 266
  4. 148
  5. 147
  6. 109
  7. 96
  8. 88
  9. 71
  10. 71
  11. 46
  12. 38
  13. 36
  14. 34
  15. 32
  16. 30
  17. 21
  18. 17
  19. 16
  20. 14
  21. 13
  22. 13
  23. 12
  24. 11
  25. 11
  26. 10
  27. 9
  28. 9
  29. 8
  30. 7
  31. 7
  32. 7
  33. 6
  34. 6
  35. 6
  36. 5
  37. 5
  38. 5
  39. 5
  40. 5
  41. 5
  42. 5
  43. 5
  44. 4
  45. 4
  46. 4
  47. 4
  48. 4
  49. 4
  50. 4
  51. 4
  52. 4
  53. 4
  54. 3
  55. 3
  56. 3
  57. 3
  58. 3
  59. 3
  60. 3
  61. 3
  62. 3
  63. 3
  64. 3
  65. 3
  66. 3
  67. 3
  68. 3
  69. 3
  70. 3
  71. 3
  72. 3
  73. 3
  74. 2
  75. 2
  76. 2
  77. 2
  78. 2
  79. 2
  80. 2
  81. 2
  82. 2
  83. 2
  84. 2
  85. 2
  86. 2
  87. 2
  88. 2
  89. 2
  90. 2
  91. 2
  92. 2
  93. 2
  94. 2
  95. 2
  96. 2
  97. 2
  98. 2
  99. 2
  100. 2
  101. 2
  102. 2
  103. 2
  104. 2
  105. 2
  106. 2
  107. 2
  108. I wish there were some way we could abolish the idea of perfect safety, because it's a pipe dream. But so many people believe in it and waste huge amounts of time chasing it. In cybersecurity, the first thing you need to do is to let go of the notion that you can create impregnable defenses that will eliminate the threat of something like ransomware. You can't. Only after you accept that will you be able to actually improve your security by taking measures that reduce and mitigate the risk. In one of my previous jobs, I was part of a multi-year project to improve the cybersecurity of the U.S. Postal Service. Our focus was not safety, but resilience. Yes, you want to reduce the risks as much as possible, but when you've done that, it's time to start preparing for the day when your defenses fail to protect you. Because it WILL happen. So you want to have a robust recovery plan in place. Instead of panicking and taking all sorts of hasty actions that don't do any good, you implement your plan to repair the damage and get your systems back up and running quickly. That's what reslience means. Most people think of cybersecurity threats as a unique category that you have to have special defenses against, but the truth is that you're talking about having a disaster recovery plan, and it doesn't matter whether your disaster is a natural one (a fire or an earthquake, for example) or a malware attack. A good disaster recovery plan will work well after either kind of disaster. That's why backups are important, for example. It doesn't matter whether your data was lost because your computer burned up in a fire or because your files were encrypted by ransomware. What matters is whether you backed them up. If you did, the disaster is just a temporary inconvenience. If you didn't, you're probably screwed. And Leo is right about people being the weakest link. That's why the cybersecurity organization organization I worked for had a category of risks called "insider threat," and it didn't distinguish between malicious and inadvertent insider actions. If a disgruntled employee (or one who has been bribed) exfiltrates copies of your proprietary data and gives it to one of your competitors, that's an insider threat. But so is a foolish employee who clicks links in e-mails or opens attachments without stopping to think about who sent the e-mail and why. In either case, the problem is the same: it's very hard to prevent damage inflicted by members of your own organization without making it difficult for your people to do their jobs. And a careless action by a dumb member of your team can do as much damage as a deliberate attack by a malicious insider. Intentions don't matter.
    2
  109. 2
  110. 2
  111. 2
  112. 2
  113. 2
  114. 2
  115. 2
  116. 1
  117. 1
  118. 1
  119. 1
  120. 1
  121. 1
  122. 1
  123. 1
  124. 1
  125. 1
  126. 1
  127. 1
  128. 1
  129. 1
  130. 1
  131. 1
  132. 1
  133. 1
  134. 1
  135. 1
  136. 1
  137. 1
  138. 1
  139. 1
  140. 1
  141. 1
  142. 1
  143. 1
  144. 1
  145. 1
  146. 1
  147. 1
  148. 1
  149. 1
  150. 1
  151. 1
  152. 1
  153. 1
  154. 1
  155. 1
  156. 1
  157. 1
  158. 1
  159. 1
  160. 1
  161. 1
  162. 1
  163. 1
  164. 1
  165. 1
  166. 1
  167. 1
  168. 1
  169. 1
  170. 1
  171. 1
  172. 1
  173. 1
  174. 1
  175. 1
  176. 1
  177. 1
  178. 1
  179. 1
  180. 1
  181. 1
  182. 1
  183. 1
  184. 1
  185. 1
  186. 1
  187. 1
  188. 1
  189. 1
  190. 1
  191. 1
  192. 1
  193. 1
  194. 1
  195. 1
  196. 1
  197. 1
  198. 1
  199. 1
  200. 1
  201. 1
  202. 1
  203. 1
  204. 1
  205. I encountered the opposite problem a few days ago: if your touchpad is disabled and you discover that you don't have a working mouse, how do you re-enable the touchpad using only the keyboard? Here's how I was able to do it on a Windows 11 laptop: 1. Press the Windows key. The Start menu is displayed. 2. Start typing "touchpad". The text you type appears in the search field. 3. After you have typed a few characters, "Touchpad settings" appears under Best Match. Press Enter to select it. 4. In the Touchpad Settings dialog, use the Tab key to select the Touchpad on/off switch. 5. Pressing Enter doesn't toggle the switch as you might expect. Instead, it expands or collapses some additional settings below that. Make sure they are expanded. 6. Use the Tab key to select the Reset button next to the words "Reset Touchpad settings and gestures to defaults". 7. Press Enter. The Touchpad settings are reset. The touchpad is now enabled. If you're wondering how I got myself into this predicament, I normally keep the touchpad disabled because I don't like it and never use it. Last week, I traveled to visit my mother in another state, and I took my laptop and mouse along. After I got there, I found that I had left the transceiver dongle for the mouse behind. (It should have been plugged into the laptop directly, but I had stupidly plugged it into a hub that I didn't need for the trip.) After reactivating the touchpad, I was able to use the computer. But I still don't like the touchpad, so I ended up borrowing the mouse from my mother's Chromebook, which she rarely uses. If that hadn't been available, I probably would have gone to Walmart and bought an inexpensive mouse.
    1
  206. 1
  207. 1
  208. 1
  209. 1
  210. 1
  211. 1
  212. 1
  213. 1
  214. 1
  215. 1
  216. 1
  217. 1
  218. 1
  219. 1
  220. 1
  221. 1
  222. 1
  223. 1
  224. 1
  225. 1
  226. 1
  227. 1
  228. 1
  229. 1
  230. 1
  231. 1
  232. 1
  233. 1
  234. 1
  235. 1
  236. I can confirm what JP says about gun owners being serious about gun safety. My introduction to gun culture was through the competitive pistol shooting sport, when my teenage son was invited by friends to attend IDPA pistol matches as a spectator and I went with him. Over time, he become more interested in the sport and began competing, first with borrowed guns and then with one that I bought for him. I attended many of the matches, and also went out to dinner with groups of the competitors afterward to get to know them. Every match was preceded by a safety brief in which the range safety officer reviewed and explained the rules of gun safety. Attending the brief was mandatory for every participant, even though most of them knew the rules by heart. During the match, each competitor was watched closely by the safety officer (SO), who would call out warnings or stop the match if a safety violation occured. These included things like having your finger on the trigger while moving, or allowing the muzzle to point uprange even a little bit. Minor infractions would result in a penalty on your score, but for anything serious, you would be disqualified from the entire match. That would happen automatically if you swept your own body or anyone else's with the muzzle, unholstered or handled your gun except when you were actually shooting a stage, or loaded your gun except when directed to do so by the SO. It's because of attending those safety briefs that I can now recite the rules of gun safety from memory, despite never having competed myself. My son is now in his thirties and still an active competitor, although being a husband and father limits his time for such things. (He and his wife met at the range.) He switched from IDPA to USPSA, and by practicing diligently, improved his scores and advanced through the ranks until he reached the highest classification, Grand Master, a few years ago. Needless to say, I'm proud of him.
    1