Комментарии:
Why are you yelling into your microphone? Had to turn my volume down to watch. Good content otherwise.
Ответитьis it actually Cisco using TCP? and how do we confirm that it is, maybe it's one of the unassigned UDP ports.
Ответить"Sometimes it misses..." Lols! Deliberately even! 😝
Ответитьis this a paid commercial?
Ответитьlmfaooo, just using your common since will keep your from getting malware on your computer, windows defender and Malwarebytes is fine, I wouldn't trust anything this guy says.
ОтветитьWhat if you bought a laptop / Desktop from eBay with windows already installed ? How can I check that they haven't installed a key logger or Malware etc ? I bought a laptop and moved the 1TB M2 Drive onto the 2nd drive and not primary drive. My primary drive is 512gb has a Dual boot Ubuntu / Win11 but I want to use the 1TB M2 drive but don't want to add my personal details till Im sure it's clean. Thanks
Ответитьso you want us to download some software that we can change the whole "config" of, like that would make a difference. And let it do what ever it wants on our system, all because you talk loud??
ОтветитьLooks interesting but my first thoughts are that the plain text yml based signatures are vulnerable, they should be locked in an encrypted vault, otherwise an attacker can just change the rules before running their attack on a machine and then ta da no alert pops up.
ОтветитьI saw it was you and was bamboozled by the comments. Surprised you arent a bit more popular
ОтветитьMy internal sigma rule detects adware.
Ответитьi dont trust never free edition with email subscribstion so no thank you
ОтветитьThis is not free unless you're a product of them!
ОтветитьWhy smart guys can’t open the file like a normal human being and they need to launch it via terminal?
ОтветитьOK best, how uninstall this ?
ОтветитьHey!
How do hackers make it look like I’m using Facebook and dating apps/sites on my phone if I don’t have any of those ?
Hello, I'm from Brazil, your channel for me is a reference on the subject of cybersecurity
ОтветитьWhat about protecting your privacy rights against Pegasus spyware on iOS?
Thks..
Subbed!
ОтветитьShould be labeled as an Ifomercial
ОтветитьWouldn't Wazuh be able to do all this too?
ОтветитьYiu didn't link it?
Ответитьi will never get haxed
ОтветитьJust a q… why so many types of rules? It looks like everyone is shillings their own rules. Now u could say there’s no rule that fits them all but since there’s a site for transforming/translating between the rules tha is aaaa maybe aaa not true. Especially because they all have a PAID version… so strange. Sigma delta, Andrew Tate rules remind me like phone chargers before USB-C and unification of standard.
Second q, is there a Linux version?
Hey just want to say thank you for taking the time and going step by step on not just this but how to open a zip file ,us noobs gotta start somewhere, thanks again 😊
ОтветитьWrong!
Only the "experts" that say " its a matter of time", and the general public GET hacked!
A REAL pro has the BEST AV, MULTIPLE security solutions, intrusiom detection systems, honeypots, backups/snapshots and WHATEVER it takes to either, NOT be taken, or be able to have EVERYTHING back withing 6 hours!
After so many years of following John I start to feel like I’m just watching ad videos for companies idk
ОтветитьHow it works the MUI of Xiaomi un Android? Are they embebed sistems?
ОтветитьBest macOS equivalent?
Ответить"it's not a matter of if, but when." ancient cybersecurity proverb.
Ответитьon this business our mantra is : "there are NO invulnerable systems, only hard to crack"
Ответитьby Gmbh?? lol
ОтветитьGreetings, can you make a paypal bypass video?
ОтветитьGreat Job I absolutely love it I already have something flagged that antivirus did not flag and I think this is one of the ways to get familiar with how ones system works even from a beginners level of understanding.
Ответитьnice work john...love all the way from Kenya
ОтветитьNot sure what I'm doing wrong but I can't access aurora in the terminal. So it won't let me run the scripts. Any help is appreciated
Ответитьmy computer were hacked once, I couldnt believe, everytime I opened quran of some people reciting very good and passionate they would remove it next day... weird I couldnt find it... good thing I backed it up, but then they started to make sound out of the quran... and they started to move my files around randomly, I knew I had a problem... in the end my laptop was hacked heavenly or by aliens by showing me out of the screen there came out orange kind of hologram and I was so scared and just shut everything down and put my laptop away in a closet... so it cant be destroyed... maybe godly hack soon after that I saw hologram of a light shaded by dark cloud like, also saw hologram that showed me gargoiles with wings trying to enter a building that shined light with two strong doors and mekkah people sitting infront of ka''aba hologram... I want crazy as this heavy magnetic thing hit my head froze me too much eventually I stood at front of my window and i tripped and broke it and never came back...
just before that yes you wont believe it was a 2 birds flying through my front door window closed I killed them both and put them in the trash can, as I was afraid of 1000 birds coming in lol.. but all things stopped though after window I broke... maybe it was from God maybe it was these bastards testing stuff... like the fruit flies that come out of my garbage with only ash snot toilet paper and oil...
Does aurora detect man in the middle attacks ?
ОтветитьAh! Thank you for this. This won you a subscription from me because this is a great way for me to dive deeper into cyber security and discover more. I appreciate this. New student of Cybersecurity Technician so this will be of incredible use.
ОтветитьJohn I think you're trying to appeal to the "average user" but the average user doesn't have the technical knowledge for this stuff. I didn't realize until scrolling through the comments how many people outside the industry are watching these videos. People in the industry know you're a legend and take you seriously. Alot of your viewers right now dont even know who you are. I'm honestly not sure how they found this video. They probably got a virus and searched "how to know if i got hacked" lol. Anyways, you're great. So is the content. We appreciate it! Keep it up!
Ответитьman oh man this man is really in a hurry!
ОтветитьWhy do they have to ask for my email??
ОтветитьAnother hipster with a beard with a Shure SM7b that thinks it makes them a broadcaster.
ОтветитьReinstalling windows from a USB drive to an NVME drive literally takes 5minutes. No internet connection. All worry free. Also, reinstalling windows could reset some program trials for you (if they're not connected to social media account)
ОтветитьA very nice ad for aurora
ОтветитьJust install my program bro, I'll clean everything.
EVERYTHING.
nothing is completely "free"
ОтветитьI am listening.......
ОтветитьIt's quite confusing to determine the number of EDR/SIEM/SOAR tools available, as there are numerous options such as Splunk, Aurora, Corelight, Zeek, MS Sentinel, Snort, Wireshark, Datadog, Graylog, Security Onion, ELK, LogRhythm, and Google Chronicle. As a beginner, it can be overwhelming to choose the right tool. Can someone please explain the differences between these tools and offer guidance on which one I should focus on?
ОтветитьWhat is the difference between this and thor can you help me understand please?
Ответить