• 0 Posts
  • 327 Comments
Joined 2 years ago
cake
Cake day: August 2nd, 2023

help-circle

  • I recently realized I’m not affected by it either, for nearly 40 years I just thought I was great at identifying it and just careful. My wife got into it a few years back and it was horrible for her (big welts and oozing stuff, pretty gross), when she went to the doctor they were like, “Yep, that’s poison ivy, here is some cream and a shot, be more careful”; so I went out and cleared all of it I could find and learned how to properly identify it.

    I still try to wear gloves because I’ve heard that you can eventually start having a reaction but I have debated the idea of using an aerosolized form of the oil as an emergency oh shit button if an unidentified masked person tries to pull me out my car.



  • Before my life shifted more into integrations I was a fan of running:

    systeminfo | find "System Boot"

    I wasn’t out to call anyone out, but sometimes users honestly believed they had rebooted and I would find of the the day’s lucky 10k. It also helped to figure out which users would just blankly say they’ve done everything.









  • Just to toss this in there, it totally wasn’t a bug, you were sending a deauth packet to force them to reconnect then recapturing their auth sequence until you had enough packets to crack the WEP key. A pretty fun demo back then was to setup a wireless bridge between an open public network and a rogue AP (usually we’d just use a pcmcia WiFi card bridge to the internal WiFi adapter); then (due to pretty much no https anywhere), you could follow peoples browsing habits, log into their MySpace/LiveJournal/DeadJournal/GeoCities/etc (passwords were pretty commonly passed in plaintext), etc.

    It was never done nefariously, but allowed us to learn a lot.