Jump to content

TSSRShot

Registered User
  • Posts

    20
  • Joined

  • Last visited

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

TSSRShot's Achievements

SNAP

SNAP (1/4)

3

Reputation

  1. Cool! Good deal then. Let me know if you get stuck. I don't know a lot of things, but I know a few dudes/girls who do. I'm doing my best not to let the man get us down! Make sure you get the option with a place to store them on the backside. That shit is pivotal. You'll break or lose half of them to human factors. TSSRShot
  2. Also, It's extremely common for F5 devices to report Ports open, in order to funnel the aggressor to Logging or detection. In fact, its standard practice for most covert Combat Support agencies. Its a concept called "crustacean security," where you intentionally don't make your shell too hard that people come at you with a hammer instead of checking the basic strengths than seem covert. (while secretly, you observe and log) Also, he's an executive, not a hacker...Pointing your finger at a 72 year old regarding Cyber Security practices is about as mature as laughing at him because he can't dunk or play WoW. Cyber Security 101...An Open Port is not equal to a vulnerability if you're aware of it.
  3. Maybe I've been silent too long, and maybe i'm TDY under the influence, but why do people keep saying "Russians" like that means State Actor. Am I the only one who listens to Bruce Schneier? Heck, you can "hippie out" and watch the new Cyberwar show on the Viceland app and get a better idea. Russia allows hackers of all kinds to do cyber work with impunity as long as targets don't coincide with Russia State bodies. This isn't new. In fact you can hire one for as little as $5 on Fiverr.com. This is known in the Network Security realm as Westphalian Fallacy. Just because someone operates from a location doesn't make them State Actors of the location they live in. In fact, of all the factors of Air Force attack vectors...attribution is our biggest hold-up, and in this case there is no clear way to assign blame. This is classic "Meet the Parents," logic...no, the Russians did not attack the DNC...an [indefinite article] Russian did...for profit. Even if it was THE Russians...we have about as much evidence as a fart in the elevator with 20 people in it. That report is complete subjectiveness. There was not a single first-hand report of Putin or Russia doing anything, except being. Trust me...i'm not a Russian sympathizer, but we've got to do something more than point fingers to appear right...and No, Wikileaks isn't the answer. That's like pointing at the wind after you fart thinking its a viable excuse to those around you. Even still, a canary isn't enough to avoid the attack: Look at OPM. OPM was warned 1.5 years in advance by Mandrake Consulting, with actual instructions on how to avoid attack from the Chinese Decentralized Unit. The appendix had step by step instructions...a monkey could have avoided it; with a football in one hand. Not having a cyber entity in-charge is a non-issue...there is taking responsibility to be done at a unit level. If I ran a mom-pop website and it was hacked because I failed to do a simple update...i'd be out the job or worse. This is an organization under Federal Review....Congressional IG...DoD-CIO...IC review. We have an internal problem. The Hillary Server should have been a conversation starter but it was wrong time/wrong place. On another note...DISA is not the solution. You can't spell disappointment without DISA. I've been on both sides of this argument in my OPS/Cyber background. DISA is a combat support agency, but they don't step to the challenge. They force services like the AF to be C&A masters when they should be more advantageous or brave and offer solutions that DoD-CIO can outright approve. But being on the OPS side of the AF I know, this is requiring an AO to accept Risk, which is like asking a person to play Russian Roulette (partly a pun) with their career. Any respectable leader in a Commercial Entity, even ones involving HIPAA, FERPA, FISMA, or Sarbanes-Oxley would have bit the bullet...the AF would still have their hands in the pockets. Cyber...OPS or Support...is an Oxymoron or a Fallacy. If you want an argument against DISA look at EFBs...DMUC doesn't provide a single service except an extremely on-time bill for $7.54 per device per month. They employ less people to manage it than an average FLIP management shop in an OSS. They offer no more than a proxy to call Mobile Iron when its not working. PureBred is the new Certificate Issuance for Mobile Devices conduit...its 2 years behind...briefed 27 times per year despite its status...and is still currently not ready. When it is allowed, they plan to phase in customers who aren't contributors to DMUC last. i.e. The Majority of the AF that isn't AMC. It sounds like a midnight QVC gone wrong. But what do I know...
  4. I've got an answer for you, but I'm TDY away from my Personal Folder...and ACC still has 99MB Mailboxes. I went to the EFB conference last year and met with one company that develops them directly with AF approval built-in (and MIL-STD). Its also designed to fit in the front of the lens cover of an Otterbox. They make a few different models for the Mini...like glare resistant to stay on all the time or just NVIS temporarily, but it scales with money. Is money a direct concern? or classic Fighter Budget-Dust? How many are you looking for? Or just testing for you? If you're not using Otterboxes...can you let me know which, so I can verify compatibility when I reach out and connect? (STS) P.S. Disclaimer...Not a salesperson...an actual crew dog.
  5. Dude but BFM in Life Aquatic was the best part...then Seu Jorge playing Portuguese David Bowie songs.
  6. I might be slightly off, but that's "tech refresh" not new capability. Tech refresh dollars maintain already existent IT items for unit C4 situations. Now, I'm not dense, I know we "cross the streams" on money where necessary to do the job, but by-the-book that's not what that money is for...and not all of us work where we can pretend that's true.
  7. Nope I certainly have. Good thing is you can put the whole bag down. I only use one book at a time, so maybe I'm not a paper power-user. My point though had nothing to do with the advantages of EFBs. Believe me, I get it. It has more to do with people trying to piss up a rope to get iPads for crews and they have no technical understanding how our crews/platform systems works. I am sure every dude wants a free iPad, but it's going to be a waste the minute we have to use the Windows based one because of our other technical limitations. We have a depot and development team for a reason.
  8. Not true. Another three letter person said no to EFBs in our airplane. Not L-3. Also, It's not an EMI issue, its an EMSEC issue. L-3 taking the bull by the horns is also a move into integrating mission planning and realtime performance computational software into one integrated product. The PTB not jumping onto a COTS solution is just because we have greater insight as a platform to not duplicate efforts when patience will serve better. I don't need a $500 PDF reader (the FLIP book works just fine for now), but we are going to need a way of better interfacing with Integrated DAPA. (Ask one of the front-end fliers) Sadly, ecosystem-wise, Windows will get it done on budget and across three different SPOs. I'm an Apple guy at home, but even I understand that.
  9. Yeah, I was in the vicinity when it went down, and the ensuing s-storm. Dude was a known issue...no clue why he was still running free at the time to be honest. If the old "if there is smoke..." analogy held true, he was 4-alarm for close to two years by my count with no one willing to be the "bad guy" and fix the glitch. As far as bodily harm, indefinite coma at the time for the lady, and from his perspective...he had no clue if he killed her or not until "arraignment." The detail most left out is that he WAS cleared hot to drink...but only because he behaved for a solid 30 days. Since its intra-community, i'd be happy to share in private, Jug...otherwise the af.mil article is good enough for general conjecture.
  10. I thought about it...once. But then Ron Swanson spoke:
  11. 2nd for above, if able. My Jeppesen Captain's Bag is just too big for anything but wide-body. I'm open to a trade is anyone wants a giant bag (brand new in wrapper) for a not-so giant bag.
  12. I thought that was it, Jughead...put the Aux pumps on the right side and drive it on the other side of the Airway...boom...instant UKRJ. I do miss my Brit raven though...a lot more polite.
  13. TSSRShot

    Gun Talk

    Anyone interested or ever thought about building their own 1911? Foster/Caspian is giving me a good deal on a three-pack of Frames.
  14. We're three for three on guys going from Nav to UPT in the guard. Some wait up to a year to actually go, but PC, Age Waiver, and acceptance being 100%. I know they had to be at least an instructor and PPL to get the invite, but we're talking heavy units not fighters/etc. Might be serious luck of the draw or those guys had beer-flavored nipples...who knows.
  15. Yeah,, we've been smashing "Standing Rock" instead of Rip-Its anyways...it fits better in the Nav Cupholder.
×
×
  • Create New...