Dale Dumbs IT Down
Dale Dumbs IT Down
  • 76
  • 164 074
Email Hacked?
In this video, we dive deep into the world of passwords and explore the importance of creating strong and unique passwords. Additionally, in this video, I will also show you how to check if your password has been compromised in a breach using online tools. It's important to regularly check your passwords for any potential security breaches and take necessary actions. With the increasing number of online accounts we create, protecting our personal information with passwords is more important than ever. However, many people still use easily guessable passwords, such as "love" or a variation of it. We discuss the reasons why cracking passwords can be necessary in certain situations but also highlight the risks associated with weak passwords. As IT administrators, we strive to implement proper password policies that balance security and convenience for users. Join us as we explore various authentication methods, including biometrics, CatCards, and two-factor authentication, and how they can help keep our personal information secure.
#CEH #CEHEXAM #Daledumbsitdown #cybersecurity
Переглядів: 74

Відео

14 Tips for Locking Down Your Android Devices | Android Security Tips
Переглядів 104Рік тому
In this video, we discuss 14 important tips for locking down your Android devices and protecting your data from potential threats. From using screen locks and downloading official apps to updating your operating system and using antivirus software, we cover everything you need to know to keep your Android device secure. We also discuss the importance of using a password manager, enabling two-fa...
Password ATTACKS
Переглядів 87Рік тому
In this video, we explore the different types of attacks that hackers use to crack passwords. We start with passive attacks, which involve monitoring and recording information without any direct communication with the system. Then we move on to non-electronic attacks, which include shoulder surfing and social engineering. Offline attacks are also discussed, which involve getting hold of the pas...
Top 10 Risks for Mobile Devices | OWASP Mobile Risks List
Переглядів 283Рік тому
Mobile devices are more powerful than ever, making them a major target for hackers. In this video, we explore the top 10 risks for mobile devices, as identified by OWASP, the Open Web Application Security Project. These risks include improper platform usage, insecure data storage, insecure communications, insecure authentication, insufficient cryptography, insecure authorization, client code qu...
Understanding iOS Architecture and Jailbreaking
Переглядів 55Рік тому
In this video, we will discuss the basic understanding of the iOS platform architecture and the different layers involved, including the Cocoa application layer, media layer, core service layer, Core OS, and the Kernel and Device Drivers layer. We will also explore the concept of jailbreaking and how it differs from rooting. You will learn how to remove the restrictions that Apple has in place ...
Cracking the Code
Переглядів 31Рік тому
In this video, we explore the layers of Android security architecture to understand the platform's vulnerabilities and how to outthink attackers. We dive into the Android kernel, the library layer, Java API framework, and the framework layer, discussing the core applications that come with Android devices. We also touch on the Notification Manager, Telephony Manager, Location Manager, and more....
Cracking Passwords
Переглядів 65Рік тому
In this must-watch video, IT expert Dale discusses the basic issues with passwords and why they are a major security concern in today's online world. He shares his passion for password security and explains why people need to stop being lazy when it comes to creating passwords. Dale also delves into the reasons why cracking passwords can sometimes be necessary and why it's important to have a p...
Stealth Scanning
Переглядів 87Рік тому
In this video, we'll explore the world of port scanning, an essential technique used in cyber security to identify open ports and potential vulnerabilities in computer systems and networks. Whether you're a beginner or an experienced cyber security professional, this video will provide you with valuable insights and practical tips for conducting effective port scans.
Port Scanning with Nmap
Переглядів 126Рік тому
In this video, we'll go over stealth scanning with Nmap, one of the most popular and capable network scanning tools in the cyber security sector. Stealth scanning is a method of scanning a network or system while avoiding detection by firewalls or intrusion detection systems. It is an essential component of any penetration testing or vulnerability assessment since it allows security professiona...
Safe Smartphone Hotspotting
Переглядів 486Рік тому
It's no secret that public Wi-Fi hotspots can be a goldmine for hackers looking to steal your personal information. But with a few simple precautions, you can protect yourself and your data. In this video, I'll show you how to stay safe while using public Wi-Fi, and how to keep your credit locked down while hot spotting. Is your smartphone a hot spot? You might not know it, but you can use your...
5 things Apple Search can do that you don't know
Переглядів 74Рік тому
I talk about 5 things that Apple Search can do, that you might not know it can do.
Big Data
Переглядів 21Рік тому
Big Data
Don't Answer Your Phone! It Might Be a Scam!
Переглядів 233Рік тому
Don't Answer Your Phone! It Might Be a Scam!
Incredible Trends In Technology You Won't Want To Miss
Переглядів 117Рік тому
Incredible Trends In Technology You Won't Want To Miss
How Safe are Bluetooth Trackers
Переглядів 103Рік тому
How Safe are Bluetooth Trackers
Don't Be the Next Victim Set up 2FA Today!
Переглядів 67Рік тому
Don't Be the Next Victim Set up 2FA Today!
What Parents Need to Know About TikTok
Переглядів 86Рік тому
What Parents Need to Know About TikTok
Our Favorite Entry Level Drones
Переглядів 28Рік тому
Our Favorite Entry Level Drones
How to Keep Your Kids Safe on TikTok
Переглядів 78Рік тому
How to Keep Your Kids Safe on TikTok
The Best Way to Keep Your Apple Devices Updated and Protected
Переглядів 51Рік тому
The Best Way to Keep Your Apple Devices Updated and Protected
5 Simple Apple Search Tips Everyone Should Know
Переглядів 63Рік тому
5 Simple Apple Search Tips Everyone Should Know
What Is Guided Access And Why You Need It On Your iPhone
Переглядів 274Рік тому
What Is Guided Access And Why You Need It On Your iPhone
How to keep your iPhone Safe from Spam, Scams and Phishing Attacks
Переглядів 65Рік тому
How to keep your iPhone Safe from Spam, Scams and Phishing Attacks
How to Turn Your Smart Home Assistant Into a Reliable Smoke Alarm
Переглядів 601Рік тому
How to Turn Your Smart Home Assistant Into a Reliable Smoke Alarm
Why I Ditched My Favorite Podcast App and Switched to Apple Podcasts
Переглядів 94Рік тому
Why I Ditched My Favorite Podcast App and Switched to Apple Podcasts
How Apple's new Focus App can help you be more productive
Переглядів 131Рік тому
How Apple's new Focus App can help you be more productive
Don’t Plug In This Cable! How The OMG Cable Can Hack Your Devices, Don't believe me watch and see.
Переглядів 10 тис.Рік тому
Don’t Plug In This Cable! How The OMG Cable Can Hack Your Devices, Don't believe me watch and see.
How to Set Up Fortnite Parental Controls
Переглядів 11 тис.Рік тому
How to Set Up Fortnite Parental Controls
Should Toddlers Be Using Tablets The Truth About Technology and Kids
Переглядів 18 тис.Рік тому
Should Toddlers Be Using Tablets The Truth About Technology and Kids
Router placement tips and tricks: How to get the most out of your router
Переглядів 2,1 тис.Рік тому
Router placement tips and tricks: How to get the most out of your router

КОМЕНТАРІ

  • @Raj.Sakaria
    @Raj.Sakaria 2 місяці тому

    How did you program it for remote access, picture, messages etc? Does the UI website walk you through it? Or it has to be done using the flash

  • @BreakfastIsDaBestyt
    @BreakfastIsDaBestyt 4 місяці тому

    Thx

  • @Jadd612
    @Jadd612 4 місяці тому

    I was at a casino mall in Vegas, and a guy at a phone charging store plugged my iPhone into a battery charger with my iPhone in it? Would you know if there is something he could have done to my iPhone with it plugged in to a street vendors cable for 5 minutes or so?

  • @halmaleh
    @halmaleh 6 місяців тому

    So boring

    • @daledumbsITdown
      @daledumbsITdown 6 місяців тому

      Here's quicker summary for you if you just want the "beef": * Emphasizing the role of parents in the digital age, parents should not to rely on their children for tech help and to understand and manage technology themselves. * The risks of children’s unrestricted access to devices are highlighted, stressing the need for parental control and understanding of technology. * Parents are advised to evaluate a new device's safety by considering its need for internet access, built-in features, and parental controls. * Parents need to learn about technology and seek help from tech-savvy individuals to protect and guide their children in a digital world. Hope that help ;-)

  • @highdesertbiker
    @highdesertbiker 6 місяців тому

    If you think disabling the features he shows in the app will stop Alexa from listening and recording you are out of your mind

    • @DaleMeredith
      @DaleMeredith 6 місяців тому

      Please share your knowledge! Love to know more!

  • @Nightrun007
    @Nightrun007 7 місяців тому

    What's the point of having Alexa if you don't want her listening? I guess my family is less paranoid and don't care if Amazon listens to our inane conversations.

  • @SpaceCadet4Jesus
    @SpaceCadet4Jesus 7 місяців тому

    Pretty rare for an ISP to offer a PPPOE connection. Maybe in Siberia?? I don't know of one, off hand. If you don't want to wait on the phone, just go ahead with DHCP, if it doesn't work, then call the ISP.

  • @daledumbsITdown
    @daledumbsITdown 8 місяців тому

    It seems that some people don't quite grasp the concept of an anecdote. The main objective of this video was to initiate a dialogue about the current generation's relationship with technology, with a particular emphasis on how many adults often require assistance from their children with new devices. The core message we wanted to convey was the importance of understanding and being able to control the technology children use. We attempted to stress the potential risks associated with devices that are connected to the internet, such as children being exposed to inappropriate content. Our recommendation is that when purchasing a new device, especially for children, one should consider whether it requires internet access and if so, what measures can be taken to ensure safety. These measures include understanding the need for internet access, the device's ability to update or download new software, communication features, web browsing capabilities, and available parental controls. However, it appears that we did not succeed in delivering this message effectively. We apologize for any confusion and disappointment this may have caused. We understand that we are only human, and we will continue to strive to provide helpful information to our viewers.

  • @harleyb-ham266
    @harleyb-ham266 8 місяців тому

    Update for all those that got fooled into watching Dale's babbling video about nothing. Most of the time, if your digital clock is blinking even after it's been set, it's probably because it has a battery back up. When those batteries die, you will have a clock that functions but constantly blinks. Replace the battery or batteries, then reset the clock and you should be good to go.

    • @daledumbsITdown
      @daledumbsITdown 6 місяців тому

      You're probably to young to remember, but VCRs didn't have batteries....when the power went out, the clock would flash.

  • @harleyb-ham266
    @harleyb-ham266 8 місяців тому

    Dale, you are a boob. I feel sorry for your family. This is supposed to be about stopping the clock from blinking. Please stay off UA-cam.

  • @NickDoddTV
    @NickDoddTV 9 місяців тому

    So you just talk about it without showing anything?

  • @weskal5490
    @weskal5490 10 місяців тому

    Good advice!

  • @Anonymous_Dab
    @Anonymous_Dab Рік тому

    personally, I use an app from my internet provider basically I have my main network password but with the application on my phone, I can set up Guest pw with limited access so anything like smart electronic wise mainly our Tv connects to my network but as a guess and I can limit their access and monitor it slightly with the app its called. Wifi Your Way is what Breezeline (formerly Atlantic Broadband) had me use for their wifi. I have no clue if you could use it without their system. Also, I know most modems have it but most people ain't gonna be able to easily set up a guest pw that way that's what makes the app so nice.

  • @ninjarider443
    @ninjarider443 Рік тому

    google "firewalla vulnerabilities" Yikes! Not interested in something like this as my edge router/firewall

  • @AbdiPianoChannel
    @AbdiPianoChannel Рік тому

    Yeah. I want one.

    • @daledumbsITdown
      @daledumbsITdown Рік тому

      LOL...remember my motto "Just because you CAN, doesn't mean you CAN!" ;-)

  • @fernandofelix3759
    @fernandofelix3759 Рік тому

    Can I use this cable to hack into my old iPhone photos and videos? I lost the passcode to it so this cable sounds like a good idea.

  • @jorgepena155
    @jorgepena155 Рік тому

    I suspect someone did this to my phone

  • @darksaga80
    @darksaga80 Рік тому

    From 5 years ago. His exploding usb drive that also broke the internet. Hak5 interview with MG: ua-cam.com/video/fV6ajbDOLbQ/v-deo.html

  • @alizee6907
    @alizee6907 Рік тому

    What happens if you plug it into a device but then remove it? Will the cable still have access to your device?

    • @patomigu
      @patomigu Рік тому

      The payload drops to your endpoint and establish a reverse shell back to the C2.

  • @nicolaslutchman9394
    @nicolaslutchman9394 Рік тому

    but how does it send these command to the iphone i can't run these commands on my phone directly with the keyboard in the iphone

    • @dumbingitdown6150
      @dumbingitdown6150 Рік тому

      You'd need a payload first. The other thing to consider is that most folks will plug this cable into their phone and then into their laptops...This would also allow me to load all kinds of goodies onto the laptop.

  • @lindaduquette8419
    @lindaduquette8419 Рік тому

    Are the cable wires bought at local pharmacies okay?

    • @DaleMeredith
      @DaleMeredith Рік тому

      Anything you buy via retail should be fine. You should be suspicious of the cables we find or borrow.

  • @QuakeDragon
    @QuakeDragon Рік тому

    I teach my employees to stop using passwords altogether, and start using passphrases. I'm also mildly surprised you didn't mention two 2FA's like Authy.

  • @shima6917
    @shima6917 Рік тому

    I bet those futuristic fridges are gonna have some serious security vulnerabilities. Especially considering they would have to have access to some sort of financial information or connect to a financial service to order stuff for you. It's funny to think that things like refrigerators and coffee machines might be one day compromising the security of our homes and businesses. Not really the devices you'd expect to be so vulnerable lol.

  • @eastern05
    @eastern05 Рік тому

    How you know so much Dale?

  • @mikesmith1678
    @mikesmith1678 Рік тому

    Hi, to be honest, I am worried. What if your password manager gets hacked? Then the hacker will know ALL of your passwords!

    • @daledumbsITdown
      @daledumbsITdown Рік тому

      That is why I suggest having a really hard password for any password managers, and also use biometrics to help and they offer 2FA

  • @johnnyngai8067
    @johnnyngai8067 Рік тому

    Don't be shy, talk to them and waste their time. They will learn not to call you.

  • @LennoxMarr
    @LennoxMarr Рік тому

    I hate you

  • @willbuskirk1242
    @willbuskirk1242 Рік тому

    That looks like a x box 360

  • @arielfernando7033
    @arielfernando7033 Рік тому

    I play a lot of Fortnite and I don’t act like that

  • @GrantisTheMantis
    @GrantisTheMantis Рік тому

    your dumb

  • @ryanburns2311
    @ryanburns2311 Рік тому

    Narc

  • @eastern05
    @eastern05 Рік тому

    Ah Dale you are so smart

    • @daledumbsITdown
      @daledumbsITdown Рік тому

      Thanks! What was your favorite Trend that you saw?

  • @heidilewis2694
    @heidilewis2694 Рік тому

    Great info! I haven't heard of a lot of these trackers. We have used tile before, and we like that one.

    • @daledumbsITdown
      @daledumbsITdown Рік тому

      What do you use your Tile for? Keys? Have you tried the Tile Stickers?

  • @BrandonFessler801
    @BrandonFessler801 Рік тому

    Love this! I’m going to look at my phone and do a little app inventory to see what I can ditch. I also love to look at how much battery and memory my apps use on my phone.

    • @daledumbsITdown
      @daledumbsITdown Рік тому

      That's a great idea! We all have to clean our phones up. Also you if you use a Password Manger you can delete apps you use only once in awhile and then reinstall them when you need to. Like Uber!

  • @emilyclarke9763
    @emilyclarke9763 Рік тому

    I really like your outlook on educating the child. Lately I’m having a real hard time with the “Disney attitude” my 8 year old loves the drama and the Disney. I’m realizing that she seems to catch on to certain ways actresses act and mimic it. I don’t know if anyone else has this problem of the tv content changing the behavior of a child. ? Thoughts

    • @daledumbsITdown
      @daledumbsITdown Рік тому

      Thanks. Yeah that is what we worry about too. If kids start and they have, doing what others do on TikTok. Not all of it is bad, learning new dance moves but where do you draw the line? Parenting theses days are getting harder and harder. Just keep having open convos with your kids.

  • @michaelweeks9273
    @michaelweeks9273 Рік тому

    Lol OK Sounds interesting and awesome In theory. But what about function. I can only accurately speak for android or. So from the factory the device USB-C peripherals are set to change only, So if no current is detected the usb connection is ignored. 2nd thing If you do not have USB debugging turned on There is No access To not only the systems usb configuration settings, or security protocol like Fingerprint. Cable is absolutely useless #1 if you don't have the developer mode enabled , #2 if the oem bootloader is locked! Yes the described method might work If you have a really old phone Or a really shady cell phone manufacturer. Is android 12 and 13 Top security. Throw in Samsung's Knox. These are all facts that I'm providing prove me wrong

    • @daledumbsITdown
      @daledumbsITdown Рік тому

      That is a valid point, Michael.....Let me give you some more info on how this exploit cable works. USB interfaces can support more than one hardware ID that the device sees (for example...USB C on a laptop supports the ability to connect a keyboard, mouse, 3 monitors, audio, ethernet and more USB ports...all from one port) On a phone, yes the cable will act as a charging cable (this is one way it powers up the O.MG implant/onboard system), but it tells your phone that it's also a keyboard, and it spins up an access point over Wi-Fi and bridges the internal network (it also has a webserver in it). So even if you select to use the cable as only a charging cable, you're never asked if you want to use it as a keyboard (this allows hackers to run scripts behind the GUI interface you see on the screen) and the wifi allows the hacker to issue command remotely (the new firmware due in 2023 will allow you to be anywhere in the world and have access to the device). In fact, the cable doesn't have to be plugged into an AC plug at all, as USB interfaces provide power via their ports, so the cable's features are fired up via the phone's powered USB port. And heaven forbid you to charge your phone with this cable from your laptop because now I'll PWN two devices ;-) I know this can be mind-blowing. I think I'll do a more in-depth video showing you step-by-step what it looks like. Oh I will say that the payloads will only run on phones while the phone if unlocked...but don't get me going on how many folks to setup security correctly on their phones ;-) I'm not sure if you're using Knox...but Samsung's market share isn't that wide globally (about 18% is all in 2021). Hope this helps!

  • @heidilewis8467
    @heidilewis8467 Рік тому

    I’m happy it’s becoming more of a thing. Even when I get annoyed with it sometimes. 😉

  • @heidilewis8467
    @heidilewis8467 Рік тому

    My brother was hacked at an airport, and the hackers took not only money from banks, but created videos seemingly from them on their social media. It was insane! No more public wifi for me. 🚫 Not worth it!

    • @daledumbsITdown
      @daledumbsITdown Рік тому

      😱 CRAZY! I am so sorry that your brother got hacked. NEVER be on Public Wifi

  • @heidilewis8467
    @heidilewis8467 Рік тому

    So eye-opening!

  • @heidilewis8467
    @heidilewis8467 Рік тому

    This is a great tip. How scary!

  • @heidilewis8467
    @heidilewis8467 Рік тому

    😮 Crazy flexible!

  • @heidilewis8467
    @heidilewis8467 Рік тому

    Waterproof!? Mind blowing!

  • @heidilewis8467
    @heidilewis8467 Рік тому

    Parenting with technology can be so difficult! I’m all for the open communication, and monitoring my own usage too. Healthy tech habits start with what they see their parents doing too.

  • @heidilewis8467
    @heidilewis8467 Рік тому

    This is so needed.

  • @heidilewis8467
    @heidilewis8467 Рік тому

    So many cool features!

  • @heidilewis8467
    @heidilewis8467 Рік тому

    Great run-through, thanks!

  • @kriscarter4727
    @kriscarter4727 Рік тому

    Good Reminder, I am pretty good at updating my own stuff but I need to be double checking my kids devices!

  • @kriscarter4727
    @kriscarter4727 Рік тому

    Thanks for the advice here. Its hard being a parent and technology being every where.

  • @kriscarter4727
    @kriscarter4727 Рік тому

    It shocks me that there is a WIFI Access point in those cables 🤯 Thanks for the great advice, I am going to have a talk with my kids as well not to use Free Charging Stations

  • @heidilewis8467
    @heidilewis8467 Рік тому

    iPod touch… that is digging deep 😆