Dale Dumbs IT Down
Dale Dumbs IT Down
  • Видео 76
  • Просмотров 162 915
Email Hacked?
In this video, we dive deep into the world of passwords and explore the importance of creating strong and unique passwords. Additionally, in this video, I will also show you how to check if your password has been compromised in a breach using online tools. It's important to regularly check your passwords for any potential security breaches and take necessary actions. With the increasing number of online accounts we create, protecting our personal information with passwords is more important than ever. However, many people still use easily guessable passwords, such as "love" or a variation of it. We discuss the reasons why cracking passwords can be necessary in certain situations but also ...
Просмотров: 71

Видео

14 Tips for Locking Down Your Android Devices | Android Security Tips
Просмотров 101Год назад
In this video, we discuss 14 important tips for locking down your Android devices and protecting your data from potential threats. From using screen locks and downloading official apps to updating your operating system and using antivirus software, we cover everything you need to know to keep your Android device secure. We also discuss the importance of using a password manager, enabling two-fa...
Password ATTACKS
Просмотров 84Год назад
In this video, we explore the different types of attacks that hackers use to crack passwords. We start with passive attacks, which involve monitoring and recording information without any direct communication with the system. Then we move on to non-electronic attacks, which include shoulder surfing and social engineering. Offline attacks are also discussed, which involve getting hold of the pas...
Top 10 Risks for Mobile Devices | OWASP Mobile Risks List
Просмотров 267Год назад
Mobile devices are more powerful than ever, making them a major target for hackers. In this video, we explore the top 10 risks for mobile devices, as identified by OWASP, the Open Web Application Security Project. These risks include improper platform usage, insecure data storage, insecure communications, insecure authentication, insufficient cryptography, insecure authorization, client code qu...
Understanding iOS Architecture and Jailbreaking
Просмотров 54Год назад
In this video, we will discuss the basic understanding of the iOS platform architecture and the different layers involved, including the Cocoa application layer, media layer, core service layer, Core OS, and the Kernel and Device Drivers layer. We will also explore the concept of jailbreaking and how it differs from rooting. You will learn how to remove the restrictions that Apple has in place ...
Cracking the Code
Просмотров 31Год назад
In this video, we explore the layers of Android security architecture to understand the platform's vulnerabilities and how to outthink attackers. We dive into the Android kernel, the library layer, Java API framework, and the framework layer, discussing the core applications that come with Android devices. We also touch on the Notification Manager, Telephony Manager, Location Manager, and more....
Cracking Passwords
Просмотров 65Год назад
In this must-watch video, IT expert Dale discusses the basic issues with passwords and why they are a major security concern in today's online world. He shares his passion for password security and explains why people need to stop being lazy when it comes to creating passwords. Dale also delves into the reasons why cracking passwords can sometimes be necessary and why it's important to have a p...
Stealth Scanning
Просмотров 86Год назад
In this video, we'll explore the world of port scanning, an essential technique used in cyber security to identify open ports and potential vulnerabilities in computer systems and networks. Whether you're a beginner or an experienced cyber security professional, this video will provide you with valuable insights and practical tips for conducting effective port scans.
Port Scanning with Nmap
Просмотров 125Год назад
In this video, we'll go over stealth scanning with Nmap, one of the most popular and capable network scanning tools in the cyber security sector. Stealth scanning is a method of scanning a network or system while avoiding detection by firewalls or intrusion detection systems. It is an essential component of any penetration testing or vulnerability assessment since it allows security professiona...
Safe Smartphone Hotspotting
Просмотров 445Год назад
It's no secret that public Wi-Fi hotspots can be a goldmine for hackers looking to steal your personal information. But with a few simple precautions, you can protect yourself and your data. In this video, I'll show you how to stay safe while using public Wi-Fi, and how to keep your credit locked down while hot spotting. Is your smartphone a hot spot? You might not know it, but you can use your...
5 things Apple Search can do that you don't know
Просмотров 74Год назад
I talk about 5 things that Apple Search can do, that you might not know it can do.
Big Data
Просмотров 19Год назад
Big Data
Don't Answer Your Phone! It Might Be a Scam!
Просмотров 232Год назад
Don't Answer Your Phone! It Might Be a Scam!
Incredible Trends In Technology You Won't Want To Miss
Просмотров 117Год назад
Incredible Trends In Technology You Won't Want To Miss
How Safe are Bluetooth Trackers
Просмотров 100Год назад
How Safe are Bluetooth Trackers
Don't Be the Next Victim Set up 2FA Today!
Просмотров 67Год назад
Don't Be the Next Victim Set up 2FA Today!
What Parents Need to Know About TikTok
Просмотров 86Год назад
What Parents Need to Know About TikTok
Our Favorite Entry Level Drones
Просмотров 28Год назад
Our Favorite Entry Level Drones
How to Keep Your Kids Safe on TikTok
Просмотров 70Год назад
How to Keep Your Kids Safe on TikTok
The Best Way to Keep Your Apple Devices Updated and Protected
Просмотров 51Год назад
The Best Way to Keep Your Apple Devices Updated and Protected
5 Simple Apple Search Tips Everyone Should Know
Просмотров 62Год назад
5 Simple Apple Search Tips Everyone Should Know
What Is Guided Access And Why You Need It On Your iPhone
Просмотров 264Год назад
What Is Guided Access And Why You Need It On Your iPhone
How to keep your iPhone Safe from Spam, Scams and Phishing Attacks
Просмотров 64Год назад
How to keep your iPhone Safe from Spam, Scams and Phishing Attacks
How to Turn Your Smart Home Assistant Into a Reliable Smoke Alarm
Просмотров 597Год назад
How to Turn Your Smart Home Assistant Into a Reliable Smoke Alarm
Why I Ditched My Favorite Podcast App and Switched to Apple Podcasts
Просмотров 92Год назад
Why I Ditched My Favorite Podcast App and Switched to Apple Podcasts
How Apple's new Focus App can help you be more productive
Просмотров 131Год назад
How Apple's new Focus App can help you be more productive
Don’t Plug In This Cable! How The OMG Cable Can Hack Your Devices, Don't believe me watch and see.
Просмотров 10 тыс.Год назад
Don’t Plug In This Cable! How The OMG Cable Can Hack Your Devices, Don't believe me watch and see.
How to Set Up Fortnite Parental Controls
Просмотров 10 тыс.Год назад
How to Set Up Fortnite Parental Controls
Should Toddlers Be Using Tablets The Truth About Technology and Kids
Просмотров 18 тыс.Год назад
Should Toddlers Be Using Tablets The Truth About Technology and Kids
Router placement tips and tricks: How to get the most out of your router
Просмотров 1,9 тыс.Год назад
Router placement tips and tricks: How to get the most out of your router

Комментарии

  • @Raj.Sakaria
    @Raj.Sakaria Месяц назад

    How did you program it for remote access, picture, messages etc? Does the UI website walk you through it? Or it has to be done using the flash

  • @BreakfastIsDaBestyt
    @BreakfastIsDaBestyt 3 месяца назад

    Thx

  • @Jadd612
    @Jadd612 3 месяца назад

    I was at a casino mall in Vegas, and a guy at a phone charging store plugged my iPhone into a battery charger with my iPhone in it? Would you know if there is something he could have done to my iPhone with it plugged in to a street vendors cable for 5 minutes or so?

  • @halmaleh
    @halmaleh 6 месяцев назад

    So boring

    • @daledumbsITdown
      @daledumbsITdown 6 месяцев назад

      Here's quicker summary for you if you just want the "beef": * Emphasizing the role of parents in the digital age, parents should not to rely on their children for tech help and to understand and manage technology themselves. * The risks of children’s unrestricted access to devices are highlighted, stressing the need for parental control and understanding of technology. * Parents are advised to evaluate a new device's safety by considering its need for internet access, built-in features, and parental controls. * Parents need to learn about technology and seek help from tech-savvy individuals to protect and guide their children in a digital world. Hope that help ;-)

  • @highdesertbiker
    @highdesertbiker 6 месяцев назад

    If you think disabling the features he shows in the app will stop Alexa from listening and recording you are out of your mind

    • @DaleMeredith
      @DaleMeredith 6 месяцев назад

      Please share your knowledge! Love to know more!

  • @Nightrun007
    @Nightrun007 7 месяцев назад

    What's the point of having Alexa if you don't want her listening? I guess my family is less paranoid and don't care if Amazon listens to our inane conversations.

  • @SpaceCadet4Jesus
    @SpaceCadet4Jesus 7 месяцев назад

    Pretty rare for an ISP to offer a PPPOE connection. Maybe in Siberia?? I don't know of one, off hand. If you don't want to wait on the phone, just go ahead with DHCP, if it doesn't work, then call the ISP.

  • @daledumbsITdown
    @daledumbsITdown 7 месяцев назад

    It seems that some people don't quite grasp the concept of an anecdote. The main objective of this video was to initiate a dialogue about the current generation's relationship with technology, with a particular emphasis on how many adults often require assistance from their children with new devices. The core message we wanted to convey was the importance of understanding and being able to control the technology children use. We attempted to stress the potential risks associated with devices that are connected to the internet, such as children being exposed to inappropriate content. Our recommendation is that when purchasing a new device, especially for children, one should consider whether it requires internet access and if so, what measures can be taken to ensure safety. These measures include understanding the need for internet access, the device's ability to update or download new software, communication features, web browsing capabilities, and available parental controls. However, it appears that we did not succeed in delivering this message effectively. We apologize for any confusion and disappointment this may have caused. We understand that we are only human, and we will continue to strive to provide helpful information to our viewers.

  • @harleyb-ham266
    @harleyb-ham266 7 месяцев назад

    Update for all those that got fooled into watching Dale's babbling video about nothing. Most of the time, if your digital clock is blinking even after it's been set, it's probably because it has a battery back up. When those batteries die, you will have a clock that functions but constantly blinks. Replace the battery or batteries, then reset the clock and you should be good to go.

    • @daledumbsITdown
      @daledumbsITdown 6 месяцев назад

      You're probably to young to remember, but VCRs didn't have batteries....when the power went out, the clock would flash.

  • @harleyb-ham266
    @harleyb-ham266 7 месяцев назад

    Dale, you are a boob. I feel sorry for your family. This is supposed to be about stopping the clock from blinking. Please stay off RUclips.

  • @NickDoddTV
    @NickDoddTV 9 месяцев назад

    So you just talk about it without showing anything?

  • @weskal5490
    @weskal5490 9 месяцев назад

    Good advice!

  • @Anonymous_Dab
    @Anonymous_Dab 11 месяцев назад

    personally, I use an app from my internet provider basically I have my main network password but with the application on my phone, I can set up Guest pw with limited access so anything like smart electronic wise mainly our Tv connects to my network but as a guess and I can limit their access and monitor it slightly with the app its called. Wifi Your Way is what Breezeline (formerly Atlantic Broadband) had me use for their wifi. I have no clue if you could use it without their system. Also, I know most modems have it but most people ain't gonna be able to easily set up a guest pw that way that's what makes the app so nice.

  • @ninjarider443
    @ninjarider443 11 месяцев назад

    google "firewalla vulnerabilities" Yikes! Not interested in something like this as my edge router/firewall

  • @AbdiPianoChannel
    @AbdiPianoChannel Год назад

    Yeah. I want one.

    • @daledumbsITdown
      @daledumbsITdown Год назад

      LOL...remember my motto "Just because you CAN, doesn't mean you CAN!" ;-)

  • @fernandofelix3759
    @fernandofelix3759 Год назад

    Can I use this cable to hack into my old iPhone photos and videos? I lost the passcode to it so this cable sounds like a good idea.

  • @jorgepena155
    @jorgepena155 Год назад

    I suspect someone did this to my phone

  • @darksaga80
    @darksaga80 Год назад

    From 5 years ago. His exploding usb drive that also broke the internet. Hak5 interview with MG: ruclips.net/video/fV6ajbDOLbQ/видео.html

  • @alizee6907
    @alizee6907 Год назад

    What happens if you plug it into a device but then remove it? Will the cable still have access to your device?

    • @patomigu
      @patomigu Год назад

      The payload drops to your endpoint and establish a reverse shell back to the C2.

  • @nicolaslutchman9394
    @nicolaslutchman9394 Год назад

    but how does it send these command to the iphone i can't run these commands on my phone directly with the keyboard in the iphone

    • @dumbingitdown6150
      @dumbingitdown6150 Год назад

      You'd need a payload first. The other thing to consider is that most folks will plug this cable into their phone and then into their laptops...This would also allow me to load all kinds of goodies onto the laptop.

  • @lindaduquette8419
    @lindaduquette8419 Год назад

    Are the cable wires bought at local pharmacies okay?

    • @DaleMeredith
      @DaleMeredith Год назад

      Anything you buy via retail should be fine. You should be suspicious of the cables we find or borrow.

  • @QuakeDragon
    @QuakeDragon Год назад

    I teach my employees to stop using passwords altogether, and start using passphrases. I'm also mildly surprised you didn't mention two 2FA's like Authy.

  • @shima6917
    @shima6917 Год назад

    I bet those futuristic fridges are gonna have some serious security vulnerabilities. Especially considering they would have to have access to some sort of financial information or connect to a financial service to order stuff for you. It's funny to think that things like refrigerators and coffee machines might be one day compromising the security of our homes and businesses. Not really the devices you'd expect to be so vulnerable lol.

  • @eastern05
    @eastern05 Год назад

    How you know so much Dale?

  • @mikesmith1678
    @mikesmith1678 Год назад

    Hi, to be honest, I am worried. What if your password manager gets hacked? Then the hacker will know ALL of your passwords!

    • @daledumbsITdown
      @daledumbsITdown Год назад

      That is why I suggest having a really hard password for any password managers, and also use biometrics to help and they offer 2FA

  • @johnnyngai8067
    @johnnyngai8067 Год назад

    Don't be shy, talk to them and waste their time. They will learn not to call you.

  • @LennoxMarr
    @LennoxMarr Год назад

    I hate you

  • @willbuskirk1242
    @willbuskirk1242 Год назад

    That looks like a x box 360

  • @arielfernando7033
    @arielfernando7033 Год назад

    I play a lot of Fortnite and I don’t act like that

  • @GrantisTheMantis
    @GrantisTheMantis Год назад

    your dumb

  • @ryanburns2311
    @ryanburns2311 Год назад

    Narc

  • @eastern05
    @eastern05 Год назад

    Ah Dale you are so smart

    • @daledumbsITdown
      @daledumbsITdown Год назад

      Thanks! What was your favorite Trend that you saw?

  • @heidilewis2694
    @heidilewis2694 Год назад

    Great info! I haven't heard of a lot of these trackers. We have used tile before, and we like that one.

    • @daledumbsITdown
      @daledumbsITdown Год назад

      What do you use your Tile for? Keys? Have you tried the Tile Stickers?

  • @BrandonFessler801
    @BrandonFessler801 Год назад

    Love this! I’m going to look at my phone and do a little app inventory to see what I can ditch. I also love to look at how much battery and memory my apps use on my phone.

    • @daledumbsITdown
      @daledumbsITdown Год назад

      That's a great idea! We all have to clean our phones up. Also you if you use a Password Manger you can delete apps you use only once in awhile and then reinstall them when you need to. Like Uber!

  • @emilyclarke9763
    @emilyclarke9763 Год назад

    I really like your outlook on educating the child. Lately I’m having a real hard time with the “Disney attitude” my 8 year old loves the drama and the Disney. I’m realizing that she seems to catch on to certain ways actresses act and mimic it. I don’t know if anyone else has this problem of the tv content changing the behavior of a child. ? Thoughts

    • @daledumbsITdown
      @daledumbsITdown Год назад

      Thanks. Yeah that is what we worry about too. If kids start and they have, doing what others do on TikTok. Not all of it is bad, learning new dance moves but where do you draw the line? Parenting theses days are getting harder and harder. Just keep having open convos with your kids.

  • @michaelweeks9273
    @michaelweeks9273 Год назад

    Lol OK Sounds interesting and awesome In theory. But what about function. I can only accurately speak for android or. So from the factory the device USB-C peripherals are set to change only, So if no current is detected the usb connection is ignored. 2nd thing If you do not have USB debugging turned on There is No access To not only the systems usb configuration settings, or security protocol like Fingerprint. Cable is absolutely useless #1 if you don't have the developer mode enabled , #2 if the oem bootloader is locked! Yes the described method might work If you have a really old phone Or a really shady cell phone manufacturer. Is android 12 and 13 Top security. Throw in Samsung's Knox. These are all facts that I'm providing prove me wrong

    • @daledumbsITdown
      @daledumbsITdown Год назад

      That is a valid point, Michael.....Let me give you some more info on how this exploit cable works. USB interfaces can support more than one hardware ID that the device sees (for example...USB C on a laptop supports the ability to connect a keyboard, mouse, 3 monitors, audio, ethernet and more USB ports...all from one port) On a phone, yes the cable will act as a charging cable (this is one way it powers up the O.MG implant/onboard system), but it tells your phone that it's also a keyboard, and it spins up an access point over Wi-Fi and bridges the internal network (it also has a webserver in it). So even if you select to use the cable as only a charging cable, you're never asked if you want to use it as a keyboard (this allows hackers to run scripts behind the GUI interface you see on the screen) and the wifi allows the hacker to issue command remotely (the new firmware due in 2023 will allow you to be anywhere in the world and have access to the device). In fact, the cable doesn't have to be plugged into an AC plug at all, as USB interfaces provide power via their ports, so the cable's features are fired up via the phone's powered USB port. And heaven forbid you to charge your phone with this cable from your laptop because now I'll PWN two devices ;-) I know this can be mind-blowing. I think I'll do a more in-depth video showing you step-by-step what it looks like. Oh I will say that the payloads will only run on phones while the phone if unlocked...but don't get me going on how many folks to setup security correctly on their phones ;-) I'm not sure if you're using Knox...but Samsung's market share isn't that wide globally (about 18% is all in 2021). Hope this helps!

  • @heidilewis8467
    @heidilewis8467 Год назад

    I’m happy it’s becoming more of a thing. Even when I get annoyed with it sometimes. 😉

  • @heidilewis8467
    @heidilewis8467 Год назад

    My brother was hacked at an airport, and the hackers took not only money from banks, but created videos seemingly from them on their social media. It was insane! No more public wifi for me. 🚫 Not worth it!

    • @daledumbsITdown
      @daledumbsITdown Год назад

      😱 CRAZY! I am so sorry that your brother got hacked. NEVER be on Public Wifi

  • @heidilewis8467
    @heidilewis8467 Год назад

    So eye-opening!

  • @heidilewis8467
    @heidilewis8467 Год назад

    This is a great tip. How scary!

  • @heidilewis8467
    @heidilewis8467 Год назад

    😮 Crazy flexible!

  • @heidilewis8467
    @heidilewis8467 Год назад

    Waterproof!? Mind blowing!

  • @heidilewis8467
    @heidilewis8467 Год назад

    Parenting with technology can be so difficult! I’m all for the open communication, and monitoring my own usage too. Healthy tech habits start with what they see their parents doing too.

  • @heidilewis8467
    @heidilewis8467 Год назад

    This is so needed.

  • @heidilewis8467
    @heidilewis8467 Год назад

    So many cool features!

  • @heidilewis8467
    @heidilewis8467 Год назад

    Great run-through, thanks!

  • @kriscarter4727
    @kriscarter4727 Год назад

    Good Reminder, I am pretty good at updating my own stuff but I need to be double checking my kids devices!

  • @kriscarter4727
    @kriscarter4727 Год назад

    Thanks for the advice here. Its hard being a parent and technology being every where.

  • @kriscarter4727
    @kriscarter4727 Год назад

    It shocks me that there is a WIFI Access point in those cables 🤯 Thanks for the great advice, I am going to have a talk with my kids as well not to use Free Charging Stations

  • @heidilewis8467
    @heidilewis8467 Год назад

    iPod touch… that is digging deep 😆