True. Many people are suspicious of black USB sticks they find somewhere near their office building but that's just racist
196
Be sure to follow the rule before you head out.
Rule: You must post before you leave.
That's why, when I leave ransom ware outside of offices, I buy the pink ones and put stickers on em.
I put them in my charger to charge them up when i need them.
But I wanna connect to ur filesystem UwU
You can also do some performance-intensive thing on you laptop like () { :|:& };:
Cool CPU benchmark
It's like a tractor pull for your computer.
Doesn't look that performance intensive to me, my phone finished it in no time.
bash: syntax error near unexpected token
)'`
It's the new Emoji feature for your Command Prompt/shell!
Can you explain what that is to the illiterate please?
It's shell a program that spawns another running copy of itself, then they both spawn another copy of themselves each, then all 4 spawn another copy, ...
No it doesn't
(They are missing a :
at the very beginning of the code block)
Hydra protocol.
fork bomb
Cool, thanks!
Seems fine to me! *plugs*
plugs it directly in my ass
Perfect move
Username checks out
I like to warm them up quickly in the microwave.
in this house we use iomega zip discs
Click... Click... Click...
Couldn't a company be easily be hacked if someone put a monitoring program in a usb and just casually drops it near the entrance of an office?
Employees might be curious enough to try plugging it in.
Absolutely, it's a common attack vector
Or I could put them in this convenient little USB warmer
(for those unaware this is a USB duplicator and Eraser, it duplicates or erases the contents of a USB drive onto the others at the push of a button).
It has an iso of Hannah Montana Linux on it
Actually, you can't put them in the computer where I work. Safety protocols, you can't use any devices except that but you're provided for you by the company
"Can't" or "don't know how"?
No you can't, every device has to be approved by the company, and they need to know exactly what you're using this device for. It's so strict that literally I can't even plug my phone into a computer if I forget to bring my wall plug, in order to charge it I mean.
So does anything other than policy actually prevent you from doing so?
The machine will log every device that gets connected and at what time.
So what happens to the device if your phone does get plugged in? Firewall at the input?
USB connection won't work, but charging and MBT protocol generally will.
Physically can't or aren't allowed to? Is there anything actually preventing it other than rules? What happens if you do?
I kinda wanna try buying a bunch of virus usb sticks and putting them into important pcs at work. Or leave them lying around the office.
A USB flash drive with viruses on will probably be pretty ineffective; someone would need to run the virus manually without AV picking it up which is pretty unheard of. Plus, any organisation worth it's salt will have a policy that automatically blocks drives that aren't encrypted with a company-issued encryption key.
The real risk is that a device like this can emulate any USB device, including disks, keyboards, monitors, serial devices, etc. So you plug in the key and in a split second it opens a terminal and types a dozen especially tasty commands...
What if it exploits the complex USB stack though?
8 GB? What am I supposed to store on that, a jpeg thumbnail?