Translation: “we are moving as fast as we can to destroy the American economy & transfer as much wealth as possible to ourselves as fast as possible.” 👇
👎53🔥11
Forwarded from Disclose.tv
This media is not supported in your browser
VIEW IN TELEGRAM
NEW - Biden's Energy Secretary: We are "pressing on the accelerator" to transition to clean energy.
@disclosetv
@disclosetv
👎117👍1🔥1
👆Translation: “we are moving as fast as we can to destroy the American economy & transfer as much wealth as possible to ourselves as fast as possible.”
👎64🔥10
Forwarded from Police frequency
Clearcreek Township Police Officer Eric Ney, shot across the face in the line of duty in mid-July, is tentatively scheduled for another surgery Monday in an effort to cure a problem involving his brain, Chief John Terrill confirmed Friday night.
Ney underwent a procedure last Monday that did not work, the chief said.
He continues to have air on his brain, the chief said. This next surgery is intended to try and correct that.
Ney, a 14-year veteran of the force, was critically injured after he was shot July 12 while responding to a domestic violence incident on state Route 48.
He was discharged from a rehabilitation facility July 29 but was readmitted to Miami Valley Hospital on Aug. 17.
His family is asking for more prayers. 🙏
https://www.whio.com/news/local/clearcreek-township-police-officer-shot-line-duty-headed-back-surgery-monday/6PAILDWUHZB3FO3B475ZITDJPA/
@police_frequency
Ney underwent a procedure last Monday that did not work, the chief said.
He continues to have air on his brain, the chief said. This next surgery is intended to try and correct that.
Ney, a 14-year veteran of the force, was critically injured after he was shot July 12 while responding to a domestic violence incident on state Route 48.
He was discharged from a rehabilitation facility July 29 but was readmitted to Miami Valley Hospital on Aug. 17.
His family is asking for more prayers. 🙏
https://www.whio.com/news/local/clearcreek-township-police-officer-shot-line-duty-headed-back-surgery-monday/6PAILDWUHZB3FO3B475ZITDJPA/
@police_frequency
❤106👍15🔥2
Forwarded from Becker News
BREAKING NEWS.🚨
It is confirmed that the FBI seized 'privileged' documents at Mar-a-Lago.
tinyurl.com/mrx37t53
It is confirmed that the FBI seized 'privileged' documents at Mar-a-Lago.
tinyurl.com/mrx37t53
🔥62👎10👍1
Forwarded from KanekoaTheGreat
"During the course of probing one such software provider, in early 2021 Gregg and his team stumbled across an IP address for a server that was purportedly associated with a company named Konnech, at least according to the records of services that track IP address ownership and location.
That IP address, it turns out, was located in China—it was evidently used by some instances of the software application for a period of time, before switching to a new IP address in Grand Rapids Michigan.
Geolocation tools that I used suggest that the server that was hosting this address in China was somewhere near Hangzhou, possibly somewhere near Zhejiang University...
While Gregg and his team were investigating, they ran some routine cybersecurity checks to see what services were being used by that Chinese IP address to determine what was behind it. One of these routine “scans” showed a port on that IP address—27017—that is typically used by a database application called “MongoDB”...
A common practice for cybersecurity professionals who are exploring a network is to “test the locks” when they find “open windows or doors” as they walk around a “building” of interest, and in this case, they did a quick check on the MongoDB port (“rattled the windows”) to see if it responded.
When it did, they next tried a pretty basic thing: they tested to see if they could log into it with the default, “out of the box” username and password. That would be a pretty dumb thing for the owner of this machine to have left in place, but it is surprisingly common.
In other words, as the cyber team rattled the windows and doors, they found a boneheaded error on the MongoDB installation that only a novice would be expected to make. The doors and windows weren’t even locked. In fact, they were wide open.
You see, when MongoDB is freshly installed, it doesn’t have proper security rules set up to restrict who can read and write data into it; unless the person configuring that MongoDB installation takes the extra necessary steps (and knows how to do it), MongoDB either has NO password, or the default password which is… well, you can probably guess. “PASSWORD”.
So Gregg’s team was able to “walk in the front door”, as it were, because there was no lock on the door, and “look around the place.”
What they found was shocking: they found data that included personal details of nearly 1.8 million US poll workers. Details like their names, phone numbers, addresses, etc. Even the names of family members: things that might routinely be collected when you hire someone and issue them a paycheck.
But they also reportedly found rich details about where election machines were located, including floorplans of buildings used in elections. Nominally, this information would be of use by the election agencies, because the application they were using helped them track their election machine inventory.
But none of this should have been left out in the open for just anyone to see; and it sure as hell shouldn’t have been done in China."
https://cognitivecarbon.substack.com/p/mongodb-what-is-it-and-how-did-it
Follow @CognitiveCarbonPublic
@KanekoaTheGreat
That IP address, it turns out, was located in China—it was evidently used by some instances of the software application for a period of time, before switching to a new IP address in Grand Rapids Michigan.
Geolocation tools that I used suggest that the server that was hosting this address in China was somewhere near Hangzhou, possibly somewhere near Zhejiang University...
While Gregg and his team were investigating, they ran some routine cybersecurity checks to see what services were being used by that Chinese IP address to determine what was behind it. One of these routine “scans” showed a port on that IP address—27017—that is typically used by a database application called “MongoDB”...
A common practice for cybersecurity professionals who are exploring a network is to “test the locks” when they find “open windows or doors” as they walk around a “building” of interest, and in this case, they did a quick check on the MongoDB port (“rattled the windows”) to see if it responded.
When it did, they next tried a pretty basic thing: they tested to see if they could log into it with the default, “out of the box” username and password. That would be a pretty dumb thing for the owner of this machine to have left in place, but it is surprisingly common.
In other words, as the cyber team rattled the windows and doors, they found a boneheaded error on the MongoDB installation that only a novice would be expected to make. The doors and windows weren’t even locked. In fact, they were wide open.
You see, when MongoDB is freshly installed, it doesn’t have proper security rules set up to restrict who can read and write data into it; unless the person configuring that MongoDB installation takes the extra necessary steps (and knows how to do it), MongoDB either has NO password, or the default password which is… well, you can probably guess. “PASSWORD”.
So Gregg’s team was able to “walk in the front door”, as it were, because there was no lock on the door, and “look around the place.”
What they found was shocking: they found data that included personal details of nearly 1.8 million US poll workers. Details like their names, phone numbers, addresses, etc. Even the names of family members: things that might routinely be collected when you hire someone and issue them a paycheck.
But they also reportedly found rich details about where election machines were located, including floorplans of buildings used in elections. Nominally, this information would be of use by the election agencies, because the application they were using helped them track their election machine inventory.
But none of this should have been left out in the open for just anyone to see; and it sure as hell shouldn’t have been done in China."
https://cognitivecarbon.substack.com/p/mongodb-what-is-it-and-how-did-it
Follow @CognitiveCarbonPublic
@KanekoaTheGreat
CognitiveCarbon’s Content
MongoDB: What is it, and how did it come into play as part of the shocking disclosure that took place at "The Pit"?
On August 13, 2022, Catherine Englebrecht and Gregg Phillips described what they found last year on an unsecured server in China: personal information for 1.8 million US election workers...and more
🔥50👍12
Forwarded from KanekoaTheGreat
"During the course of probing one such software provider, in early 2021 Gregg and his team stumbled across an IP address for a server that was purportedly associated with a company named Konnech, at least according to the records of services that track IP address ownership and location.
That IP address, it turns out, was located in China—it was evidently used by some instances of the software application for a period of time, before switching to a new IP address in Grand Rapids Michigan.
Geolocation tools that I used suggest that the server that was hosting this address in China was somewhere near Hangzhou, possibly somewhere near Zhejiang University...
While Gregg and his team were investigating, they ran some routine cybersecurity checks to see what services were being used by that Chinese IP address to determine what was behind it. One of these routine “scans” showed a port on that IP address—27017—that is typically used by a database application called “MongoDB”...
A common practice for cybersecurity professionals who are exploring a network is to “test the locks” when they find “open windows or doors” as they walk around a “building” of interest, and in this case, they did a quick check on the MongoDB port (“rattled the windows”) to see if it responded.
When it did, they next tried a pretty basic thing: they tested to see if they could log into it with the default, “out of the box” username and password. That would be a pretty dumb thing for the owner of this machine to have left in place, but it is surprisingly common.
In other words, as the cyber team rattled the windows and doors, they found a boneheaded error on the MongoDB installation that only a novice would be expected to make. The doors and windows weren’t even locked. In fact, they were wide open.
You see, when MongoDB is freshly installed, it doesn’t have proper security rules set up to restrict who can read and write data into it; unless the person configuring that MongoDB installation takes the extra necessary steps (and knows how to do it), MongoDB either has NO password, or the default password which is… well, you can probably guess. “PASSWORD”.
So Gregg’s team was able to “walk in the front door”, as it were, because there was no lock on the door, and “look around the place.”
What they found was shocking: they found data that included personal details of nearly 1.8 million US poll workers. Details like their names, phone numbers, addresses, etc. Even the names of family members: things that might routinely be collected when you hire someone and issue them a paycheck.
But they also reportedly found rich details about where election machines were located, including floorplans of buildings used in elections. Nominally, this information would be of use by the election agencies, because the application they were using helped them track their election machine inventory.
But none of this should have been left out in the open for just anyone to see; and it sure as hell shouldn’t have been done in China."
https://cognitivecarbon.substack.com/p/mongodb-what-is-it-and-how-did-it
Follow @CognitiveCarbonPublic
@KanekoaTheGreat
That IP address, it turns out, was located in China—it was evidently used by some instances of the software application for a period of time, before switching to a new IP address in Grand Rapids Michigan.
Geolocation tools that I used suggest that the server that was hosting this address in China was somewhere near Hangzhou, possibly somewhere near Zhejiang University...
While Gregg and his team were investigating, they ran some routine cybersecurity checks to see what services were being used by that Chinese IP address to determine what was behind it. One of these routine “scans” showed a port on that IP address—27017—that is typically used by a database application called “MongoDB”...
A common practice for cybersecurity professionals who are exploring a network is to “test the locks” when they find “open windows or doors” as they walk around a “building” of interest, and in this case, they did a quick check on the MongoDB port (“rattled the windows”) to see if it responded.
When it did, they next tried a pretty basic thing: they tested to see if they could log into it with the default, “out of the box” username and password. That would be a pretty dumb thing for the owner of this machine to have left in place, but it is surprisingly common.
In other words, as the cyber team rattled the windows and doors, they found a boneheaded error on the MongoDB installation that only a novice would be expected to make. The doors and windows weren’t even locked. In fact, they were wide open.
You see, when MongoDB is freshly installed, it doesn’t have proper security rules set up to restrict who can read and write data into it; unless the person configuring that MongoDB installation takes the extra necessary steps (and knows how to do it), MongoDB either has NO password, or the default password which is… well, you can probably guess. “PASSWORD”.
So Gregg’s team was able to “walk in the front door”, as it were, because there was no lock on the door, and “look around the place.”
What they found was shocking: they found data that included personal details of nearly 1.8 million US poll workers. Details like their names, phone numbers, addresses, etc. Even the names of family members: things that might routinely be collected when you hire someone and issue them a paycheck.
But they also reportedly found rich details about where election machines were located, including floorplans of buildings used in elections. Nominally, this information would be of use by the election agencies, because the application they were using helped them track their election machine inventory.
But none of this should have been left out in the open for just anyone to see; and it sure as hell shouldn’t have been done in China."
https://cognitivecarbon.substack.com/p/mongodb-what-is-it-and-how-did-it
Follow @CognitiveCarbonPublic
@KanekoaTheGreat
CognitiveCarbon’s Content
MongoDB: What is it, and how did it come into play as part of the shocking disclosure that took place at "The Pit"?
On August 13, 2022, Catherine Englebrecht and Gregg Phillips described what they found last year on an unsecured server in China: personal information for 1.8 million US election workers...and more
👍40😢1
Forwarded from Miz Donna thoughts (Donna Willett)
It's not enough.
But it is a sign that
The FBI administrative state knows they are in trouble
Freaking Lindsey Graham said there would be riots in the street.
That is what they want ..
Happy Warriors. Peaceful
But it is a sign that
The FBI administrative state knows they are in trouble
Freaking Lindsey Graham said there would be riots in the street.
That is what they want ..
Happy Warriors. Peaceful
👍49🔥18