Skip to main content

Logo

CIS 75 - Principles of Computer Security - Shared screen with speaker view
ciaran farley
32:46
aaaaahahhhhhhhhh
Sam Perez
38:55
ProtonMail uses built in PGP encryption for sending emails
Sam Perez
38:58
You just have to enable it
garrett gordon
41:22
how there is now way to import pu keys into Proton?
garrett gordon
41:31
*public
Sam Perez
42:52
I thought it was Monday;...
Sam Perez
42:56
unless I misread it
Jacobs Otto
43:31
Monday 4-6:50 is the slot
Ryan Mock
43:58
Everything ok?
ciaran farley
44:05
https://www.cabrillo.edu/publications/schedule/current/wrap/final_exams.pdf
Jacobs Otto
45:13
Just want to make really sure, WEDNESDAY final, correct?
Jacobs Otto
45:18
Nice
ciaran farley
51:14
do backups of backups need redundancy ?
ciaran farley
57:06
it was their "product" details that were released not their customer data ...
Ryan Mock
01:06:07
if you told your friend an idea and he used it to make something new/different
ciaran farley
01:07:25
is deciding that you would wrather watch your blu-rays on a plex server on your tv instead of directly off the disk a loss of IP ?
kyle b
01:12:42
no
Joseph Calcagno
01:12:44
no
bruce hartman
01:12:45
no
Sam Perez
01:12:45
no
Philip Lawrence
01:12:46
no
Edgar Austodillo
01:12:47
Do you have the copyright?
Edgar Austodillo
01:12:52
i.e. the right to do that?
Sam Strelitz
01:13:01
You're using their property in a way that isn't authorized, so I'd say 'yes'.
Bobby Garcia
01:13:06
someone somewhere is going to feel violated
bruce hartman
01:13:08
he's out of the classroom
Kevin Cameron
01:13:18
It depends on who you ask.
Bobby Garcia
01:13:32
it depends if you get caught
ciaran farley
01:13:44
well is there any way to buy a movie just as the raw file to watch from a home media center because if you want ot use your own media server you kinda have to "rip" some other way they you bought the content
kyle b
01:13:49
the IP hasnt sufferd in its value so its not a loss
Kevin Cameron
01:13:51
@Sam: Some would say once you buy a piece of media it's your property, not the company's.
bruce hartman
01:13:55
what if your DVD goes bad... but saving it to disk, you still have access to the purchased product ...
Joseph Calcagno
01:14:04
no because you are authorixed to that content as long as you dont share
Bobby Garcia
01:14:05
I think the big companys can sue, but weigh the cost
Jacobs Otto
01:14:08
@Kevin John Deere would like to have a word with you
kyle b
01:14:52
tru tru
Sam Perez
01:14:55
When you purchase digital software, you technically purchase a "license" that gives you right to use it that can be retracted from the company at any given time. That's rare though
Sam Perez
01:15:05
digital media**
kyle b
01:15:39
if they drive it
kyle b
01:16:23
but we didnt borrow the dvd
ciaran farley
01:16:27
but when you import a cd into itunes, they are loosing the sale of the same album on itunes
kyle b
01:16:27
we purchased it?
ciaran farley
01:16:58
they want to force you to buy it again for each format you want it in
Jacobs Otto
01:17:18
I think apple banks on the potential that you'll like their platform so much thtat you may buy from them in the future and may buy hardware from them to play the music
ciaran farley
01:19:35
hmm
Sam Perez
01:19:36
i lost track of time and it cost me $50
Sam Perez
01:19:46
parking ticket
ciaran farley
01:23:16
just kinda curius how many alarms wer set off by us that you had to clear ?
Edgar Austodillo
01:24:04
Can we keep snooping around the CIS network for "research/experience" purposes
Jacobs Otto
01:24:12
Just on Christmas?
bruce hartman
01:24:26
dmin admin
Jacobs Otto
01:24:30
auth token revoked
Edgar Austodillo
01:25:04
haha sounds reasonable
ciaran farley
01:25:14
try to hack the arduino in the network traffic monitor to make it start a disco
Jacobs Otto
01:27:14
Did I hear correctly that apparently the security camera in rm 830 was bent away from fully viewing the room?
Edgar Austodillo
01:28:29
2 in fact
Jacobs Otto
01:28:37
Sorry, that's what I meant
garrett gordon
01:29:09
for an 8ch 4k nvr I have 16 TB
garrett gordon
01:29:23
and only get about a month of continuous recording
ciaran farley
01:31:22
can a windows computer be connected to multiple user servers ?
Bobby Garcia
01:31:38
it was me, not trump that typed that last tweet
Joseph Calcagno
01:33:02
haha sure
ciaran farley
01:33:55
well if a windows computer could be connected to multiple domains then you could connect the stem PCs to the domain you control for your stuff and the one for the school so we could still login with our accounts
Joseph Calcagno
01:35:39
whether
Joseph Calcagno
01:36:00
weather
garrett gordon
01:39:26
by definition isps dont have firewalls
garrett gordon
01:39:34
our shouldnt going to the net
garrett gordon
01:39:46
*or
garrett gordon
01:40:09
use l2tp
garrett gordon
01:40:14
or openvpn
Kevin Cameron
01:40:19
Dang, good to know.
garrett gordon
01:40:54
comcast blocks you from running an smtp server on 25
garrett gordon
01:41:33
yup
garrett gordon
01:43:37
comcast inserts html into webpages when you go over 1 tb
garrett gordon
01:43:59
http only
Ivers Spivey
01:59:11
no point to decrypt then
Sam Strelitz
01:59:19
Would it not work both ways?
Philip Lawrence
01:59:22
layers
Bobby Garcia
01:59:23
i would want to open it if i didn't know who it was from
Sam Strelitz
01:59:26
Or so you know which one to do first?
Bobby Garcia
01:59:28
wouldn't
ciaran farley
01:59:28
it has to be done in reverse order that it was done it
kyle b
01:59:33
so you dont waste time
ciaran farley
01:59:39
like an onion
Philip Lawrence
01:59:41
layer one dycrpty the sign, then decrypt the message
Joseph Calcagno
01:59:53
dont decrypt a msg not from alice
Joseph Calcagno
02:00:22
no point in decrypting a msg from a random
ciaran farley
02:00:38
if there are 2 doors in a a hallway you have to go through them in the right order otherwise you are teleporting
Kevin Cameron
02:01:11
For the GPG lab, which order would/did you prefer?
Joseph Calcagno
02:01:24
yes
ciaran farley
02:05:31
how do you know if its a public or private key I thought they were just 2 keys and its arbitrary what one si what side ?
Edgar Austodillo
02:11:56
Why do you need to hash the key again? why not just sign it?
Edgar Austodillo
02:12:35
why hash the public key?
ciaran farley
02:13:07
on slide 73 you said that firewalls seperate trusted and untrusted networks but the firewall between the dmz and the outside world is between two untrusted networks
Edgar Austodillo
02:13:12
ah ok
ciaran farley
02:16:26
is this technique used to "tell if an image has been tampered with" in csi shows ?
ciaran farley
02:17:04
*like in csi shows
Joseph Calcagno
02:20:13
so someone cant snatch your public key and distribute it prentending to be you
Edgar Austodillo
02:23:58
Are key collisions possible/ an issue?
kyle b
02:27:49
god is a self signed cert
Edgar Austodillo
02:28:36
Thank You!
kyle b
02:28:43
thanks, Mike!!
Kevin Cameron
02:28:47
Have a good night everyone! Thanks for the class, Mike!
Joseph Calcagno
02:28:51
Thanks Mike
kyle b
02:28:56
Mike is a self signed cert