Cyberjoke Friday v1.95

Yes it is a good day for CyberJoke Post today 10/7/16 where we try to make light of some IT life since it is too hard to make the heavy lifting of Cyber understanding.  Sometimes good to take a day off.

Here is an interesting website: Surfersam.com

Best quotes

“I have traveled the length and breadth of this country and talked with the best people, and I can assure you that data processing is a fad that won’t last out the year.”
— The editor in charge of business books for Prentice Hall, 1957

Computer programmer jokes

  • In C we had to code our own bugs. In C++ we can inherit them.
  • Question: Why do they call it hyper text?
    Answer: Too much JAVA.

Wow this Pinterest board has some good Cybersecurity joke images

timeforanewpasswordimage

This image is originally from itgovernance.co.uk  and is a good illustration of what not to do. Please do not put your passwords on a post-it note

 

malwaredownload-example

Yes before deciding to have all employees connect with their devices to the corp network realize you are opening up to new risks.

 

useraccount-versusadminaccount

This discusses the concept of user account privileges versus admin privileges (i.e. cant install programs without admin pw)

This image is from nakedsecurity.sphos.com

Also from Sophos a new post that talks about computer users have given up on learning more Cybersecurity attacks.

We are always fighting the concept of

Versus

Functionality <——-> Security

Cyberjoke friday v1.93

Cyberjoke Friday to break up the Cybersecurity posts:

livetweetingkindergarten

realize that our kids and other young people are using technology in ways we don’t understand if we let them… that is why I try to use new technologies and apps every so often.

write500timesonblackboard

Some kids that grow up coding will look at tasks in a different way..

I’m sure the teacher said  write “I will not throw paper airplanes in class”500 times

Sure he can write those 7 words 500 times or he can write a function which would have written it if compiled in C.

#include(stdio.h>

int main(void)

{

for (count=1; count<=500;count++)

printf(“I will not throw paper airplanes in class”);

return 0;

}

 

I always try to find other ways to attempt to show that hackers will hack you even if you don’t know how they do it. They think different, and thus it is unique new problem that Cybersecurity pros have.

 

Since it is Friday I will leave you with:

minionquotes

Cyberjoke Friday v1.92

Another Cyberjoke installment on this day in April:

All I can say is that maybe we can learn more from jokes than telling you not to do something….

Phishing – Dilbert

more phishing  – Beattie

And a real news story from England¹:   It is tough when a command does what it is supposed to do – I guess we can chalk that up to inexperience, naivete, or just plain stupidity.

 

There was a reason when I worked at an unnamed company and all commands on a critical system were double checked by another person.  This system worked  (SPOE – Second Pair of Eyes)

I need a SPOE please was a frequent call on some days.

cyberjokeFriday

 

 

  1. http://www.independent.co.uk/life-style/gadgets-and-tech/news/man-accidentally-deletes-his-entire-company-with-one-line-of-bad-code-a6984256.html

Cyberjoke Friday v1.9.1

Internet Help Desk  Youtube:

“The hold button is your best friend”   Who is the boss?

from 2001  video.

Can’t get your email – Can you be more specific

Please turn on your computer!!

this is what happens when you are on hold:

techsupportcyberjoke

Plan B when there is a 12:00 flasher ask for the kid in the house.

12:00 flasher is when all the devices in the house flash 12:00

can’t fix

It is a problem when the people are not versed in basic IT functions and have not spent the time to do basic troubleshooting (like is the computer on).

 

Another aspect is Social engineering …

Microsoft tech Scammer:

The Scammer  is very shift and does not answer what company they are from.

Always says I am from Windows Technical Department

The main thing is the scammer  wanted the user to get access to the computer.