All Episodes

August 29, 2023 • 62 mins

Have you ever wondered how a manual labor worker ends up working with the FBI in cybersecurity? Today, we bring you the fascinating journey of Amanda, who made the remarkable transition from manual labor to cybersecurity, thanks to a career-ending injury and a surprising knack for technology. Join us as she shares her intriguing insights into the world of cybersecurity, the Google Cyber Security course, and how to find your niche in this rapidly evolving field.

In a surprising turn of events, Amanda's journey became even more fascinating when she had to use her newly-acquired Open Source Intelligence (OSINT) techniques to outsmart an online stalker. If you've ever underestimated the power of keen observation and attention to detail, Amanda's real-life experience will make you think twice. She shares how she managed to locate a potential troll from a single photograph, a testament to the power of OSINT.

As the conversation unfolds, we also delve into Amanda's inspiring journey of learning programming and mastering technical concepts, despite not having a technical background. Learn how she grappled with Python, explored different learning methods, and discovered the importance of scripting. But that's not all. We also examine the significant role of privacy and anonymity in social media, the limitations of anonymity, and the possible implications of the power grid and the internet going offline. So, prepare yourself for a thrilling ride as we unravel the world of cybersecurity through Amanda's eyes.

Support the show

Merch: https://cyberwarriorstudios.com/store
Youtube: https://youtube.cyberwarriorstudios.com
Twitch: https://twitch.tv/CyberWarriorStudios
Twitter: @CyberWarriorSt1
Discord: https://discord.gg/eCSRzM6mJf

Mark as Played
Transcript

Episode Transcript

Available transcripts are automatically generated. Complete accuracy is not guaranteed.
Speaker 1 (00:00):
It is me the Cyber Warrior.
This is Cyber Warrior Studiosand I know you're all here for
another amazing security happyhour.
We got a big show planned.
I ain't gonna lie.
My sister, amanda, is in thehouse.
We're gonna have a longconversation.
It's gonna be a funconversation.
There's gonna be some drinks tobe had and some talk to be had,
because we got some stories totell, some oscent to share and a
little bit of information aboutthe Google Cyber Security

(00:22):
course show.
Just stick around for a fewseconds.
I promise we'll be right backMUSIC and we're back and hold on
there.
It is the official kickoffsecurity happy hour.

(00:42):
Welcome to the show, amanda.
Thank you for joining me thisevening.
How are you doing today?

Speaker 2 (00:47):
Good, good, good, glad to be here.

Speaker 1 (00:51):
I'm happy to finally have you on because ever since I
, kind of you know, pushed youinto starting this journey, I've
been trying to get you on.

Speaker 2 (00:58):
Yeah, well, I kind of had to understand a little more
of the lingo.

Speaker 1 (01:04):
LAUGHING, but yeah, so it's all good.
I love having you on and we do.
We have quite a bit to sharebefore we get started For
everybody in chat.
Like I said on YouTube, if youhave questions, ask as we go
along.
Super chats automatically getpinned.
They go to the top and I'm ableto show them to Amanda right
away, so we will do that as well.

(01:26):
Otherwise, we'll run this showlike we always do.
So, amanda, kind of give me awell, not me, because I've
already talked to you, but givethe audience a little bit of an
introduction to yourself andwhat got you into cybersecurity.

Speaker 2 (01:40):
Oh, let's see.
Well, I've spent most of mymost of my adult life just
trying to figure out exactlywhat it is that I wanted to do
in my life.
I was very happy in the bluecollar manual labor type work.
There was actually like aperiod of time a couple of years

(02:01):
ago when I was getting intothat, that point in my life
where I was like, okay, I know,blue collar work is not
something I'm going to be ableto do forever, it's just not a
long lived career and it's mybody was already starting to
show signs of you don't got manyyears of this left.
So I was starting to lookaround and a really good friend

(02:24):
a couple of years ago actuallyput cybersecurity like presented
it to me and I was like I'mlike, dude, you know me, my
track record with technology isa need to know basis and that's
about it.
We don't risk it.
And just kind of floated alonglike looking for things.
And then I actually got hurt.

(02:46):
It'll be a year a year inAugust I hurt my back.
Five bulging discs ended theblue collar career and just been
kind of sitting around tryingto figure out what it was.
And it was.
I had just met you through thePagan project and popped into a
live I think you and Looney weredoing, and I was like, okay,

(03:07):
I'll bite, I'll bite, what do?

Speaker 1 (03:09):
I need to do.

Speaker 2 (03:10):
How does I think?
My exact comment was how doesone get into cybersecurity?
And it just kind of bloomedfrom there.
You threw a ton of informationat me.

Speaker 1 (03:18):
I got so overwhelmed until you discovered my super
secret skills and that's andthat's really what it comes down
to is finding your niche,finding what you're good at or
what you're really passionateabout anyways, and there were
things that you were doing thatyou didn't understand how it
translated into cybersecurityExactly, and I think a lot of

(03:43):
that goes to, and this is whyand I forgot to put it on my
LinkedIn post, even though yousaid I should do it, you know,
this is why I said you'd be likea great fit for like the FBI or
you know any other three letteragency or even you know some
other organizations is yourability to dig and dig and dig
and dig.

(04:03):
I mean, you're like your ownpersonal FBI.
So how did that start, likewhat really got into that?
And how are you giving and youdon't have to give all of the
how it started, like any detailsthat you'd rather leave out,
but essentially really whattriggered you to kind of dig
into that OSINT and findingprofiles and things like that?

Speaker 2 (04:23):
It actually started to outsmart a stalker.
I had a online stalker and theykept finding out stuff about me
that I had no idea how theywere finding it out.
So I started kind of justplaying around like just to try

(04:49):
to get ahead of this person, andit just kind of evolved from
there and through the year, likethe couple years like so that
was probably like three yearsago, three, four years ago that
that started and it went on fora couple years and then I

(05:09):
started to have issues with thisperson and everything, and just
meeting some other people thatare kind of skilled in the same
area kind of taught me somethings and I've always had kind
of a natural ability to see thethings and hear the things that
aren't said or kind of see thethings that one normally

(05:31):
wouldn't notice.
Like.
I don't necessarily want tocall it detail oriented, it's
just picking up the littlethings.

Speaker 1 (05:40):
Right, and well, you know, I've noticed a lot of
people have a knack for thatright.
Looking at the little detailsthat a lot of people overlook, a
lot of people miss from ascreen name to a, the way they
speak to the way they type, tothe way they, you know, kind of

(06:02):
label, everything the exact sameway.
And so that's one of thosethings where, if you look at it,
that's how a lot of people havebeen caught, because there's
people like you that can pick upon those little signs, like, oh
, I'm going to have the sametype of handle in everything
it's always going to have, likeeither this or that or the third
.
And when you start noticingthose trends it makes it easier

(06:24):
to find people.

Speaker 2 (06:25):
Yeah, that, actually that most recent one on that
TikTok issue that was was kindof not the most most recent one,
but the one of somebody goingon a made up account no
followers, no following weredumb enough to use an actual
photograph not of their face,but it was an actual photograph
and it's like I still feel thatlittle bit of like gosh, I'm

(06:49):
crazy.
But just from that photo aloneI was able to tell that it was
not pulled off of the internet.
It was either pulled off of aprivate profile or was an
original photo from their camera.
And just the contents of thepicture alone I was able to.
Like the biggest thing in therewas like, oh okay, there's like
three cars in it.

(07:11):
Like let's, let's try to look atthe car directly in front of
the one where where it was taken, couldn't zoom in close enough
to see a license plate.
But there was three carsoncoming.
So I looked at that.
All three cars did not havefront license plates.
So quick Google what statesdon't require front license
plates?
Narrowed down, or gave me 22states.

(07:32):
But I already had kind of asuspect.
But if going through there,going into the general area, was
able to determine that thatpicture was taken somewhere in
the vicinity of Wichita Kansas,actually did find the exact
intersection that thatphotograph was taken at.
And then, I think it was acouple of days later, somebody
else commented from theiroriginal profile, in the exact

(07:54):
same pattern of speech, thatthey were commenting on this
fake profile.
And boom, there it is, and theywere confronted with it and
admitted that it was them andthey were from Wichita Kansas.

Speaker 1 (08:07):
And that's the craziest thing is when, when you
look at it and we got Nataliehere and everybody else's
agreeing but the power ofobservation, and that's what it
comes down to.
And now they try, they try, butit it doesn't work for
everybody, but they try to teachthat in the military right,
especially if you're going to bein certain positions and doing
certain jobs, you have to beable to see everything, all your

(08:30):
exits, who's around you, what'sgoing on, how everybody's
acting, all these things.
And so you get that from moreof a real life perspective.
But I think it's harder forthem to do on a digital
perspective, because if youdon't understand the difference
between Photoshop and what isfake, or now you have AI and
everything like that, it is veryhard to decipher that sometimes

(08:52):
, and even myself I'll look atcertain pictures and I can tell,
I'd say probably 90% of thetime, when it's Photoshopped, ai
is probably 95%, maybe 99, justbecause there's a lot of a lot
of glitches and a lot of thingsthey distort in AI images.

(09:13):
That it's, you know, really easyto tell Depending on who
created the image.
But from a perspective of justdifferent people doing, trying
to be trolls and trying tocreate different profiles and
trying to do different thingsthey don't change.
Humans don't change.

Speaker 2 (09:33):
Increasing the habit.

Speaker 1 (09:34):
Does not change, and so, when you're looking at it
from an observation perspective,we can go into the one person
that we've been dealing withrecently where all of their
names are the exact same format,the way they speak is the exact
same in every comment,everything they do is the exact

(09:54):
same.
They don't change.
Now, it is one thing if youwere a someone like myself who's
a business.
I have Cyber Warrior Studios, Iown it, I have the Cyber
Warrior in recently digital heatand on TikTok, you know, but I
do everything under generallysomething about Cyber Warrior.
I'm not hard to find.

(10:17):
I don't make it hard to findbecause I ain't doing shit that
I care, that I care if somebodyfinds out about I hope you find
me and watch my shit or maybethat I'll get paid for it.
But for other people they do itand they troll and it's like
dude, I can find you, like Iknow people that in 0.5 seconds
will find you.

Speaker 2 (10:34):
How long did it when you went from when I replied to
you about that?
How long did it take me to havethat article?
I think, a minute yeah.

Speaker 1 (10:43):
I think it was like anywhere from like half a second
, no, from about 30 seconds to aminute, and then possibly just
because you had to type it andor do the copy and paste, and
that was the second thing Ilooked up.
It did not take long.
I looked up something else firstbefore going to that, so yeah,
so it's one of those things whenyou look at this and this is

(11:05):
where we get into public andprivate information right when
we look at these things, theonly thing private that has my
name on it is my Facebookprofile.
I will share things publicly ifit is in regard to cyber
warrior studios.
Other than that, unlesssomebody else has a public
profile and they tag me in it, Iam.

(11:27):
Everything I do is private,because I have a private life
that I want to keep to just myfriends.
How often do you come acrossand I think this is the biggest
thing, especially incybersecurity and IT when you
are looking at socialengineering and really taking
advantage of the situation, ofwhat hackers take advantage of

(11:47):
well, not hackers, but attackersand people trying to do
malicious things?
How often do you run acrossprofiles that are public,
completely public, with all theinformation out there?

Speaker 2 (12:02):
Honestly, I think I run into more public than
private accounts.
I would say I run into more andI can still get what I need off
of a private account, but it isnot even so much you, as your
friends and family.
I get more information fromyour friends and families

(12:24):
accounts than I get off of yours.

Speaker 1 (12:27):
I have actually seen that on tech talk, where people
have done that.
They have been like, oh, I gotthis, I knew who they were
tagging, but I couldn't get yourinformation.
So I found people who taggedyou in things and got their
information, which led me backto you and who you are and where
you're from.
And when I was, I think, yousent me that video.

Speaker 2 (12:48):
I probably did because you sent me that I'm
like yeah, that's exactly what Ido.

Speaker 1 (12:52):
Yeah, when I was, You're right.
I'm like, yeah, I'm not gonnaget your information as your
baseball candle, but yeah, Ithink it's one of those things
you look at and people don'tunderstand that it's not.
It's like six degrees to KevinBacon.
Right, Like, you can make allyour shit private, but if you

(13:13):
are allowing people to tag you,allowing people to mention you,
and it links back to you in anycertain way with your government
name, with your legit name,you're gonna get found.
There's nothing you can do aboutit, which is one of the reasons
why I despise Metta and likethreads came out and they're

(13:34):
like oh, get threads, dah, dah,dah, dah, dah, dah, dah.
And all these people are gonnasay, no, hey, I got enough
social media that I need toworry about.
I don't need one more.
To like, I gotta be posting on.
I can't even keep up with BlueSky or whatever the hell it is,
Let alone threads like I.
No, no, it's not gonna happen.
And so I look at this what doyou think is the easiest social

(14:01):
media, whether it be TikTok,Facebook, Instagram, is it?
Facebook, Is it?

Speaker 2 (14:05):
the information Is the easiest.
That's literally the onlyreason I still have a Facebook,
because that is the easiest oneto get information.
I haven't spent enough timedigging in TikTok to evaluate it

(14:27):
.
Instagram can be tricky if youdon't know what you're looking
for, and half the time with thetwo of those I go back and forth
between Instagram and like.
If I can't find what I'mlooking for on Instagram but I
found their Facebook, I'll gothrough their friends list on
Facebook to find to see if I canfind an easier formatted handle

(14:50):
like user ID, because ifsomebody uses like, oh like.
They don't have their nameconnected to it.
But that's like, oh like.
Flower child 58 is theirusername, but they don't have
their name attached to it.
So, okay, maybe one of yourfriends has their name attached
to their Instagram and then allI have to do is go find you and

(15:13):
they're following to find yourInstagram.
So with that, I know there'sprobably more efficient ways to
do what I do, but this is justthe method.

Speaker 1 (15:24):
Have you ever done a reverse image search on Google
yet?

Speaker 2 (15:27):
Yes.

Speaker 1 (15:29):
That is an amazing tool.
It is such an amazing tool toliterally drag and drop an image
into Google and it's like ohyeah, it's been used all of here
and you can find the originalsource.

Speaker 2 (15:40):
Yep.

Speaker 1 (15:42):
And I'm like.

Speaker 2 (15:43):
Yeah, that's what I used on that, that one picture
that was like it's a roaddriving into a sun.
That dropped that in there.
Found stuff similar, but didn'tfind that image.

Speaker 1 (15:55):
Yeah, I like Bing too .

Speaker 2 (15:57):
Bing actually gives you less shopping options than
Google does.

Speaker 1 (16:02):
Yeah yeah, Google is very broad, Bing's more narrowed
.

Speaker 2 (16:08):
But yeah, like if you're trying to do a picture of
a person on Google, it kicksback what they're wearing.
I'm like I don't care aboutthat.
I want to know who that is.
Oh.

Speaker 1 (16:22):
Yeah, that makes sense.

Speaker 2 (16:25):
Bing still does the same thing, but it actually will
kick you back.
People that resemble it or theactual picture.

Speaker 1 (16:31):
Yeah, and that's the hardest thing to find is the
actual picture, and that's oh,hold up Infinite Improbability.
Ai, the creator of Silk Road,was found out because he
promoted it using a personalemail or something similar.
Why does that not shock me?

Speaker 2 (16:53):
101, create another email address that is not
associated to you.

Speaker 1 (16:59):
So I had a contact reach out to me recently and she
said hey, I want to helpsomeone out, but I don't want to
put my name on it.
How can I do it anonymously?
Well, it's hard to be ever everbe completely anonymous.
But if you're worried abouttheir as long as they're not a
security person you can gothrough like a VPN and create a

(17:23):
free email on I prefer ProtonMail, but anything and just
don't put your real name in it.
Don't put your real anything.
Then it can't come back to youExcuse me, because it's all fake
and now that's not going towork with something like the FBI
or any of those three letteragencies, but for Joe Blow out
there, screw it.

(17:44):
Go out there, put a fake name onit.
Call yourself Felicia freakingsmorgasbord.
I only say that because,felicia, you were the last one
to leave a comment on YouTube.
That's the first name to pop myhead.
But call yourself whatever youcould give yourself a female
name, a male name, whatever nameyou can call yourself an alien,

(18:05):
put whatever you want on it,nobody cares as long as there's
two names.
You could literally put a bunchof characters in that mean
absolutely nothing, and everysingle provider will allow that
to go through.
What I will say is don't everput your real birthday on there.
Just make yourself as old aspossible, however old it allows

(18:28):
you to make.
You go ahead and make it as oldas possible, because then what
are they going to say?
They can't link it back to yourage, they can't link it back to
you.
So if you're trying to beanonymous and do things the
right way, again, it's not goingto pass three letter agencies,
because you're still going to dothings that are going to

(18:49):
trigger their investigators here, like Amanda, who should be
with these three letter agencies, but it will bypass many other
normal Well, I hate the wordnormal, nobody's normal.

Speaker 2 (19:05):
Any other weirdos?

Speaker 1 (19:06):
like us that just work in cybersecurity but avoid,
don't observe, everything.
Yeah, us people, us, the onesthat don't see the little things
, that's who it'll bypass.
But no, so I love it and Ithink that's a lot, because what

(19:28):
do you, if you were to see howsome of these organizations act?
Would you put yourself more asan investigator, or would you
put yourself more as someone whowants to do like hands-on tech

(19:48):
work If you're going through theGoogle course, so I don't want
to get into that yet.
I still got a lot of time leftfor this show, so I just want to
.

Speaker 2 (19:57):
I can't get an answer .
Just still, with my trackrecord with technology, I would
love to be an investigator, likethat's still, like, like I told
you when you pointed this outto me, I'm like you mean I could
have been paid for this hobbythat I've been enjoying for the
past couple years.

Speaker 1 (20:18):
Yeah, a little bit a little bit.
You could have been gettinglike GS, whatever pay by now and
be sitting in bankroll and shit.
Instead you're sitting thereand been like shit.

Speaker 2 (20:33):
Yeah, I was like shit .
Yo Did never even dawned on me.

Speaker 1 (20:42):
Space Tacos.
Amanda is a naturalinvestigator.
She is the one I go to her, andlike one or two other people,
but first her.

Speaker 2 (20:51):
And then the other one comes to me too.

Speaker 1 (20:54):
Right, everybody else goes to you, but if she can't
find something right away, thenI will, you know, offshore my
services.
But mostly it's Amanda and it'sabsolutely amazing because I
love, I love what you're doing,because it shows just the
importance of keeping thingsprivate, and that's one.

(21:17):
Again I go back to the military, because when I deployed in the
army, me and my wife had theconversations and she knew when
I was supposed to be gettingback and I had told her.
I said hey, you don't post whenI'm leaving, don't post when
I'm getting back.
You don't post that I'm gone.
You can post that, hey, you'rehaving fun with the kids.
You can post you're doing allthis.
You do not share informationthat I am not around.

(21:42):
You don't do these things.
And so now, as things got closer, yes, we had conversations and
it was like, oh, you know, hewas supposed to be back today.
Date's changed, he'll be backeventually.
You know things like that.
Okay, but not, hey, he's comingback today, or he's coming back

(22:05):
next week, or he's coming backthat you don't do.
And so she knew that.
And so that is where I loved.
You know, one of the reasonsthat my wife was amazing when it
came to social media is becauseshe understood what you do and
do not share on a publicplatform.
Yeah, and, and she did amazingat that.
But at the same time, I'm thetype of person that I taught her

(22:31):
keep things private.
What is you, is you.
What is what you want for yourfriends, is for your friends,
and that's it.
That's, that's yeah.

Speaker 2 (22:40):
I see someone like me , someone like how my mind works
, I would notice.
Granted, I mean, I understandthe reason for the military not
sharing dates and everythinglike that was married to the
military.
I understand that spiel, but asjust for like the generalized,
like safety of it, like just notadvertising to the world that

(23:03):
you're home alone without.

Speaker 1 (23:05):
Exactly when.

Speaker 2 (23:06):
that's what we came down to my mind would notice,
she hasn't posted a picture ofhim in a while.

Speaker 1 (23:13):
You, son of a bitch.
I love you, amanda, but damnyou.

Speaker 2 (23:19):
Like I told that one girl, like in that, in that um,
was that the pagan projectserver that was concerned about
someone finding her location or?
Yeah, I don't remember what itwas.

Speaker 1 (23:30):
I forget which one it was.

Speaker 2 (23:31):
I'm in both, but I remember her saying something
like oh, the only thing I postis just like selfies in a room,
and I think I have one with mycoworkers at work.
Okay, time out, it's at work,not to scare you or anything.
But what I'm going to do is I'mgoing to zoom into that picture
, I'm going to look at thebackground and I'm going to find
out where you work and then I'mgoing to Google that find who

(23:54):
works with you, because even ifyour profile is locked down, one
of theirs might not be Not toscare you, but in my, I don't.
I would not do anything to harmanybody, but if my mind works
that way, there's people outthere with bad intentions.
That mind works the exact sameway.

Speaker 1 (24:15):
So I got I got a ton of fun comments to share with
you.
First is Natalie.
I share purposely misleadinginformation a lot, so people
have no idea if it's real or not.
That is absolutely amazing.
And, Natalie, we are, we'reboth in the army.
I absolutely love that.
That's awesome.
Um, let's see what's the nextone.
Uh, so space taco says shewould notice the exact same

(24:39):
thing.
So everything about what you'resaying she would notice like
missing husband, da, da, da.

Speaker 2 (24:46):
It's like there's a ton of pictures of the kids but
there's none of him, and therewas a lot before.
Now there's not.
Yeah.

Speaker 1 (24:53):
Angie.
Historical behavior.
Um Felicia, exactly what I wasthinking.
Amanda, where is he?
Are they divorced?
Is he kidnapped?
One hour post the pick of pickof him every three days.

Speaker 2 (25:11):
Yeah, there you go.
Have a backlog of like justrandom pictures Make sure
they're in different outfits andone Um, let's see.

Speaker 1 (25:22):
Yes, I did the same thing.
Uh, switch VPNs now, okay.
So, yeah, it's, it's Amanda.
She just said Amanda, you'reher new cyber BFF.
Uh, oh, that's all right, yougot.

(25:43):
You got fighters in the mix Onehour.
Nope, I saw her first.
But yeah, that's the thing,right?
So we, we notice all thesethings and, once again, if you
look, I'm posting these, but ifyou want questions answered or
if you just want to be noticedand I can throw it on screen, go

(26:06):
ahead and make a super chat.
Otherwise, I'm just going topost it as it comes in.
Um, I don't know what the hellit was.
Uh, let's see who doesn't postmisleading information on their
social media.
Me, I just post memes.
I don't know if that'smisleading, I put strong lyrics.

(26:27):
Mine is mostly memes and cause.
They're motivational.

Speaker 2 (26:32):
AR knows that.
Look, I think it's all postmisleading information.

Speaker 1 (26:36):
It's just motivational shit.
Get bent homie.

Speaker 2 (26:39):
I think I just I just use song lyrics as my captions,
which I did finally.
I did finally take it offprivate after nuking the old one
.
Did either yesterday or thismorning took it off private.

Speaker 1 (26:56):
Oh, she's like, finally I did it happened.

Speaker 2 (26:59):
Yeah, I mean let somebody.
Let somebody try again, we'llhave fun.

Speaker 1 (27:04):
Oh look, I won't be so nice this time.
We've got a whole crew here.

Speaker 2 (27:07):
Oh, I won't be so nice this time.
We're going to have fun now.

Speaker 1 (27:10):
It's going to be a blast.
Everybody can go at it.

Speaker 2 (27:13):
Oh, I won't.
I won't be nice this time.
I've I've tried to be nice, butwe're past being nice.

Speaker 1 (27:19):
So so now we lead into our next topic, and a very
important topic, because I knowKevTek IT supports going through
the course.
I know you're going through thecourse, I'm sure there's some
others going through the coursethe Google cybersecurity course.
What have you thought about itso far?
Coming in as someone who knewnone of the terminology, only

(27:40):
knew, like you had, anunderstanding of how to turn the
computer on and off and typeand then the internet and how to
dig up shit on people.
That's about all you knew.
So what have you thought aboutthe course so far?
Like, what is it given to you?

Speaker 2 (27:58):
Honestly it.
It has been amazing for, likehow they advertise it as being
geared towards people with notechnical background.
I'm like that's me.
Sign me up and it's definitely,and I love how they break
things down the further I getinto it.

(28:19):
Do I think I would get a jobbased off of just this alone?
Probably not, but it gives methe foundation that I need to
understand other things.
But they introduce a topic,they break it down, they break
down parts of the differentthings and as you keep going,

(28:39):
those things come up again, theydefine it again and then they
show you ways that it ties intodifferent things.
It's like I can't speak highlyenough for it, especially if you
are somebody with no technicalbackground.
The presenters are mostlypretty great.

(29:00):
There's a couple that I'm justsitting there like okay and like
we were talking about earlier.
I discovered I was actuallybarely disappointed.
I thought I was going tothoroughly enjoy Python, but I
don't like it.

Speaker 1 (29:15):
I think you can have a conversation.
I think you will enjoy itbecause it is very user friendly
and reader friendly, but itcomes down to the way it's
taught, how it's taught andthings like that.
And I do have a book for you Ifyou decide as we go through our
discussions that you want toget into it.

(29:37):
Failing that, I may justeventually give it away.
So if you don't want it, I'llprobably do a giveaway here
shortly.

Speaker 2 (29:43):
I always love learning new things or trying to
learn new things, like that'slike I've been a career student,
like things interest me, I'mgoing to research the snot out
of it, kind of built into mynature.

Speaker 1 (29:59):
Right.

Speaker 2 (30:00):
And.
I'll give anything a try and,like I said, I thought I was
going to enjoy.

Speaker 1 (30:03):
It Could be the instructor, and I think it may
be, and again, it comes down tothe way our brains are wired and
how we learn, and when you getdistracted by an instructor in
stupid flies getting in my hair.

Speaker 2 (30:15):
I can see him.

Speaker 1 (30:18):
Shit.
But again, I think you could doa lot with it.
I think it would work great forwhat you do because it could
pull when you script thingsproperly.
You can create programs thatwill pull all the information
you want.

Speaker 2 (30:32):
Yeah, that's why I thought I was going to like it
and like I think you do have avery valid point because of like
what we talked about earlier.
It's like I don't know if it'sa combination of running out of
steam coming out of a coursewhere the instructor had such a
deadpan voice and face.
Plus, this instructor has anaccent that's very singsongy and

(30:56):
it's distracting to my ADHDbrain, even medicated.
So I'm like thinking about howhe just pronounced a word and
like oh, that's what I'm like.
Oh wait, I should be payingattention to this.
So I think you have a veryvalid point.
I may try to learn it inanother way.
I'm doing all right on thequizzes after that first one.

(31:17):
That first one was rough.

Speaker 1 (31:19):
Yeah, and as a thing is like.
So I took, I've passed a fewPython exams.
I don't think I should havepassed, but it's one of those
things where I grew up in HTML,kind of like you right, we grew
up in the HTML age fromprogramming my space to just

(31:42):
websites.
It didn't matter, and I used todo it all in no pet.
So for that I ended up lookingat it as I can do anything in
code, but because of the waycertain programming languages
work, I just couldn't handle it.

(32:03):
It just I was like dude, I'mlost.
I understand nothing about this.
I took C++ in college.
I took other courses, I've gonethrough Python and I'm one of
those people that I love Python.
I think it is amazing language.
It could do so much.
Scripting languages are myfavorite.
Python is by far number one.

(32:26):
It is so reader friendly inwhat it's doing.

Speaker 2 (32:29):
I did enjoy that.
When I got into the labs of it,I was like, oh cool, I can like
this one.
This one makes sense, I can seeit.
I'm not confused which Iremember we talked about when I
first got into the Linux one.
I was so intimidated andterrified I had to sit there.
I was sitting there like this,when I was getting ready, I had

(32:53):
the screen up and it had the bigstart lab button.
I'm sitting there like oh myGod, oh my God.
And I'm like, wait, it's a lab,you can't make it blow up.
Let's do this.
And then by the end of it Ithink I texted you right after
it I was like I feel likePenelope Garcia.

Speaker 1 (33:11):
So what I'm about to do is I'm going to send you my
playlist to my Linux basics forhackers.
I'm going to send you thatentire playlist because I went
through the entire book and alot of the commands that you
already learned.
You're going to go throughagain, but I try to explain it
in a way that is different thanothers.
So I hope it helps in yourlearning.

(33:33):
For that, because Linux is likethe primary operating system
for anybody in this fieldbecause it can tie into every
operating system.
You can actually take that andpull information from whatever
the hell you want.
It doesn't matter.

Speaker 2 (33:49):
Yeah, I definitely want to get like I have.
I just after yeah, just after Igot home from work today, I did
finish week one, of courseseven.
So I have three more weeks inthis course and then I have one
more for the Google one, but Idefinitely.

(34:09):
So I don't remember what'ssupposed to be gone over.
This entire one is on Python,but I don't remember what the
eighth course is on.

Speaker 1 (34:20):
But I definitely want to get more intimate with Linux
, yeah, but and we'll get intoit and me and you will go
through more and look, I see allyour books there.
Go ahead, show the audience,yeah.

Speaker 2 (34:34):
And this one's full, all the shit you've been
learning this one's full.
And then we're pretty far intothis one and I'm one of those
note takers where, like, that'smy notes.
And it's like that throughalmost the entire book.
So, yeah, I'm writing textbooksover here, but that's how I

(34:57):
remember things, like as I'mphysically writing it, it like
writes it into my brain and like, even like that, just even
though I wrote it down, I justmisread like the instructions on
one of the Linux labs and I'msitting here, like you get an
hour to do them, and I'm sittinghere.
I burned up probably 15, 20minutes trying to figure out

(35:20):
what was going on.
And then, like I read theinstructions and it's like
navigate, because I could notfigure out why it wasn't finding
this file I was supposed tofind them like, and I was like,
oh, because I'm not in the rightdirectory.
And then the one.
The next one was on SQL and Iburned up half my time trying to

(35:41):
like how their labs work.
Is they give you like a list ofsteps, like usually your first
couple, like early on in thecourse.
They give you literal, step bystep instructions and then, as
you get further, they're likeokay, find this.

Speaker 1 (35:56):
And then you have to remember how to find that Find
locate are the best commands inLinux, but they are the best.

Speaker 2 (36:07):
Well, it was you were supposed to be like I don't
remember the exact specificthing, but through like each one
, like sometimes they'll giveyou like a question to answer,
like oh, which, what's the?
The first username under thiscategory, and like you check it
and everything.
But then once you're finishedeach task, it says check my

(36:29):
progress and as long as you dideverything correctly, it'll say
finished, or it'll say you didnot complete it.
And I got to.
It was like the last task on aSQL thing and it gave me two
different things I had to find.
I got the questions correct,finding these things so clearly
I found them, but when I hitcheck progress, it said I didn't

(36:53):
complete it.
I went through, I think, threeor four different ways for each
of these things I was supposedto find, to find the tables, and
I found the exact sameinformation and realized more
than likely that very first one.
I was supposed to find a tableand then find this information
on the table, but I found theexact just what I wanted and I

(37:18):
was like and it's still I couldnot.
I'm like, if you want, me touse the code.
Look, I will not use a command,not have me find it.
Four different ways for twodifferent things, so that was
like eight different thingstotal to find the same
information.
I think I remember going off toyou I'm like clearly I know
what I'm doing and this isn'tgreat, and so I'm moving on.

Speaker 1 (37:40):
Yeah, I absolutely despise SQL.
Anybody who knows anythingabout me.
I've gone through a lot ofcourses.
I have more letters after myname than the damn alphabet, but
I despise SQL.
I despise anything with web appjust because it's not my forte.
It's not what I enjoy, it's notwhat I've delved into.

(38:02):
I've been able to program, butever since web apps and web
programming have become moreadvanced, I never kept up with
it, and so for me it's more of amore of the internal guy.
Give me networks and windowsand operating systems and things
like that, I'll go Ham, I lovethat shit.

(38:22):
But you start talking to meabout web apps these days.
Look, if you've gone beyondXHTML, dhtml and HTML, I'm
fucking lost.
I'm like, eh, and so when itcomes to like SQL injection and
like the different things youcan do with SQL, literally I
passed my OSCP and it was justme getting lucky finding I did

(38:47):
some research, found some shitthat worked for some shit, and I
was like, all right, we'regonna find a way to get through
this, let's do it, let's justfigure it out.
But I say that becausecybersecurity is all about
research.
Everything we do is the abilityto find information.

(39:10):
Which goes back to everythingyou have done so far in your
life and getting to where you'reat now.
It's been about finding theinformation, being able to do
the research, being able tofigure out okay, what do I need
to find, what do I need to do,how do I need to do this, this
and this.
So in that regard, I would sayyou're further ahead than a lot

(39:35):
of people that have been in thisfield for a while, because we
lose that ability.
We lose that, especially onceyou get to a certain level.
You're no longer doing theresearch, you're no longer
taking action, you're no longergetting hands on keyboard.
So for you, you're furtherahead than I would venture a

(40:00):
guess, 60% of the people outthere, if not more, if not more.
You're further ahead than thatBecause you've done the.
You have and have done theactions that are necessary to
not only learn cybersecurity,but you've been doing it since
before you knew aboutcybersecurity or you got into it

(40:20):
.

Speaker 2 (40:21):
Who knew, who knew?
Yeah, but again, like thecourse on networks, like when
you said oh, I think I almostdidn't quite cry my way through
that, but that one was stressful.
That one was I was like wait,what I was like because like
I've purposely, it's like okay,I can make it do what I need it

(40:42):
to do.
Can I tell you how I made it?
Do it?
Absolutely not.

Speaker 1 (40:47):
Nope, not a clue, I just got it to work.

Speaker 2 (40:50):
Is it possible it might blow up Next time you look
at it wrong.
That's also possible, but I gotthe information I needed and I
got it to do what I needed.
Just don't look at it too hard.

Speaker 1 (41:04):
So Natalie and my boys are in AR, so infinite
probability AI Dude.
I freaking hate that name.
You need to change it, freebrain.
But both of them they talkabout scripting languages, which
is what Python is.
And so Natalie's commentlearning different scripting

(41:28):
languages are easy once you getthe hang of one.
Lies, lies and deceit, and Istand by that.
So Amanda here over here hasnot gone through anything more
than Python.
I have played in Ruby.
I have played in Pearl.
I have played in Python.
Walk that shit.

(41:49):
No, no, no.
Ruby and Pearl get bent.
I will never touch them shitsagain if I can avoid it.

Speaker 2 (42:00):
No, this is all I've done on Python so far.
Just this right here.

Speaker 1 (42:08):
Python is extremely reader friendly.

Speaker 2 (42:11):
Yes.
It is very print this.

Speaker 1 (42:14):
Do that.
It is very basic in the wayit's commands are written.

Speaker 2 (42:18):
And that's where it was deceiving.
It was deceiving.
It made me think I was safe andcomfortable, and then I'm like
I'm so confused right now.

Speaker 1 (42:27):
Ruby and Pearl and I dealt with.
So I've worked within Rapid7and kind of fixed some of the
scripts for one of the companiesthat I used to work for.
There's a language where theerror statements are similar,
but the way it is written Iliterally was like what the hell

(42:53):
are you trying to do here?
Like I can't.
I don't even know why it'sraking.
I can't figure out what you'retrying to do.
I know it's here, I know thisis the variable, I know this is
what you're trying to do, butI'm lost.
Fuck it, we're just gonna putit in parentheses or changes
command.
We'll figure it out, we'll getthere, we'll make it work.

(43:13):
And that was literally what Icame down to.
Whereas with Python, when I'vecome across broken scripts or
shit that just doesn't want tofunction right, I'm just like
all right, cool, so you're doingthis, this, this.
Oh, you hit another file.
All right, let me go here.
This, this, this, ah, this iswhere it broke.
All right, let me fix this andgo back and it'll function
properly.
I have fixed bash scripts andPython scripts.

(43:36):
Well, I personally didn't fixthem.
I let the people know that itwas broke and I let them know
why it was broke and what wasbroken.
Only because I am not reallygood at the whole GitHub pull
request thing.
My old job tried to get me goodat that and I still suck at it.
So I'm more of like hey, canyou fix this please?

(43:58):
This is what's wrong and thisis what it takes to fix it.
Can you please go fix it sothat I don't have to?
That's kind of how I operate.
I'm kind of like you know what,you fix it on your end.
I'm just gonna let you knowwe're in the slack, we're good,
that's fine, I mean it works.

(44:20):
So so with that, all right.
So I'm gonna have you chime inon this.
So Natalie says you'reresourceful.
You find the answers, you'resure.
Once you get the hang of usingthe self-help tools on one tool,
you learn how to use them toyour advantage With that, and

(44:42):
here we go, Solo.
What would you say has been thebest way for you to learn this
so far, and how have you beenable to take what you're
learning with the Google Cybercourse into what you've been
doing in day to day and justkind of how you've been going

(45:03):
about learning cyber in general?

Speaker 2 (45:12):
All right now I just completely blanked on.
You put me like solo and I'mlike, oh God, you love it.

Speaker 1 (45:19):
Don't lie, you're meant for it.
You belong here.

Speaker 2 (45:21):
You've been doing it all the time for like not making
TikTok content.
I'm like I can be in like aconversation sitting.
Yeah, being resourceful, I'vedefinitely through learning
everything.
I definitely would do Googlethings as well as looking up

(45:44):
other YouTube.
Like once I got enough of asolid foundation, I did start
watching more like separateYouTube videos and I'm
definitely hitting up withquestions like, especially if I
need something clarified.
Like I think I under, I forgeteven what it was.
The last one I was like okay, Ithink I understand this, but
I'm not sure if I understandthis.
I thought I did, but then theyconfused me.
So is this this?

(46:07):
And I don't even remember whatit was at this point.
But I said, yeah, I just I gogo through different avenues to
find how it's explained.
In the best way for me tounderstand, I think, is if
that's if I'm understanding thequestion correctly whether it be
Google YouTube you.

Speaker 1 (46:31):
How about me?
I mean, that's one of thosethings.
So have you, because of all theprivacy issues, because of
everything you have foundrecently, especially in all the
digging you've done and nowunderstanding more about
cybersecurity and more aboutprivacy and what is public, have

(46:52):
you done more to kind of hidewho you are?
So we know, google, Apple,amazon, facebook, all these
companies kind of trackeverything and they can find
where you're at, what you'redoing.
It doesn't matter what you do,they know it all.
Have you done more to kind ofget away from those other than

(47:16):
social media, other than what weneed to do to promote ourselves
and what we're doing, linkedin?
But in your daily life, yoursearches, your what you're doing
online like, are you using moreVPNs?
Are you doing more with likedot, dot, go, like?

Speaker 2 (47:33):
are you doing more to kind of?

Speaker 1 (47:35):
get away from the corporate structure of the way
the internet is right now.

Speaker 2 (47:42):
I do occasionally use a VPN, though some of the sites
that I use don't work with them, so I do and, oddly enough, my
banking app does not, or my bankperiod.
The website and the app willnot work with their VPN on will

(48:06):
not work.

Speaker 1 (48:08):
I'm not gonna put this out there.
I mean you will talk privatelylater.
That intrigues me.

Speaker 2 (48:14):
Yeah, it completely.
I was like they couldn't giveme an explanation, like I
thought the app was down.

Speaker 1 (48:19):
Oh, I got an explanation.
I've got a reason.
I'm just intrigued thatactually didn't play, because
I've never seen that in play fora bank.

Speaker 2 (48:30):
Yeah, like I thought the app was down, I was like
that's weird.
And then I called.
I was like is there maintenance?
That's been going on with thisapp for two weeks and then it
clicked as I asked that I'm likethis started right after I put
the VPN on my phone, so I turnedit off and I was like, oh, it
works.
Okay, that's weird, why.

Speaker 1 (48:51):
So I can tell you why .
Do you wanna know why?

Speaker 2 (48:54):
Yes.

Speaker 1 (48:55):
So if you are coming out of a location other than
where they locally operate, soyou look at certain banks that
are only in certain states orcertain areas of the country or
certain parts of the world.

Speaker 2 (49:06):
My main intention is why, though?

Speaker 1 (49:07):
They will block access if you are in areas,
because all of these, a lot ofstates and a lot of countries
well, all countries, but a lotof states, though will have IP
addresses that are local to them, that are assigned to those
states and to those locationsyeah, so if you're coming out of

(49:30):
an area that is not local towhere your bank is, they block
it.

Speaker 2 (49:36):
But my bank's nationwide.

Speaker 1 (49:39):
Well then, where the hell was your VPN coming out of?

Speaker 2 (49:42):
I think it was set to New York at the time, then
they're blocking actual VPNs.
That's kind of what I wasassuming, but and it's possible.

Speaker 1 (49:54):
There's VPNs.
All your VPNs have an IPaddress range assigned to them.
Well, should, there's a fewthat don't, because they're more
anonymous and allow you to kindof like float.
But generally speaking, a lotof your VPNs have a static IP
address assigned to them, sothey get put into blocks and

(50:19):
they say, hey, if you're comingfrom a VPN provider, we're not
going to be provided by you.
You could potentially usesomething like a proton VPN Tor.
Tor is hit or miss just because, yeah, if you are coming from
the wrong location or peopleknow that it's a Tor end node,

(50:41):
they block it.
All known Tor end nodes getblocked on certain sites.
So if it gets flagged as a Tornode, yeah.

Speaker 2 (50:51):
I had to double check which one?
Yeah, I have proton.
I'm surprised, protons blockedprotons, like they're anonymous.

Speaker 1 (50:57):
They don't log anything.
So they say again I trust themmore because they're out of
Sweden.
That's why I take my protonmail.
That's why I do what I do.
Through them they're lesslikely to comply with other
people's bullshit.
But yeah, I'm surprised theirVPN got flagged.
They might need to change IPaddresses.

(51:17):
Yeah, that was weird, Like Idon't know.

Speaker 2 (51:21):
Yeah, that was weird, like I mean, it made sense, but
it was weird at the same time.
I'm like okay, whatever, Iunderstand.
Right, it's one of those thingsyou understand.

Speaker 1 (51:33):
You're like kind of makes sense, but at the same
time I'm kind of like I want tobe able to use a VPN to access
this shit.
Yeah, because I use a VPN likeif I'm, I now have it set up on
my phone.
If I'm going through andconnect to an Xfinity Wi-Fi or
something else or another Wi-Fihotspot, I want my VPN to kick

(51:55):
on and I'll access my bankthrough that, because I don't
trust that Wi-Fi network.
I don't trust sitting on it.
So that's really odd.
That proton got flagged andthey're normally not willing to
share that information.
So if they got flagged, thatmeans someone's watching their

(52:16):
IP address space.
And if your bank's doing that,I'm really worried Now on what
bank you're using.
You might want to go somewhereelse because they're watching
all your money.

Speaker 2 (52:28):
What money Shhh?

Speaker 1 (52:31):
You're not supposed to tell people you're broke.
I actually know we're bothbroke.
I got super chats and if youwant to donate to the cause,
some of it is for other places.

Speaker 2 (52:42):
Yeah, I mean after this back injury, I mean I've
been unemployed for almost ayear, so, yeah, what money.

Speaker 1 (52:48):
Ha, ha, ha ha.
Well, we're gonna get you there.

Speaker 2 (52:51):
We're gonna get you there.
What's the goal?
The?

Speaker 1 (52:53):
whole point of you being here is we want to get you
there and get you to a pointwhere, look, I want you to be
working for any organization,any company, any whatever that
you can utilize your skillset.
You have so many differentskills, whether it's the passion
for learning, the ability togrow, the knowledge for the open

(53:17):
source intelligence, and thefact that you can literally take
a username and turn it into anentire dossier of a person is
absolutely amazing.
Like, you give me a username,I'm gonna look at that.
I'm gonna go okay, I found this, this and this.
I give you a username, you'regonna have a 20 page dossier in

(53:41):
about 10 minutes, being like,hey, this is everything they've
done in their life and I'm likeha ha ha.

Speaker 2 (53:49):
The last situation.
Dude was dumb enough to put hisVenmo in his bio.
It was that easy.
Well, this is true, it was thateasy.
I was like, oh look, there youare.

Speaker 1 (54:04):
Yeah, but that's the thing.
So you know, it's one of thosethings I've looked at that get
really curious about situationsbecause we're at a time right
now where, let's be honest, theshit's hitting the fan.
Things are going crazy, peopleare going crazy.
So, in your eyes, if you wereto look at privatizing

(54:25):
everything, what would you sayto protect people from being
found by you, what advice wouldyou give?

Speaker 2 (54:34):
Get offline.
I mean that does sound likearrogant or anything, but I mean
some information and I'm notgonna fully disclose all of this
, but I have recently, like,done a deep dive on somebody

(54:55):
that I found absolutely zilch onthat person, but I found
everything to do with theirfamily, which thus led me back
to them, so, and all of theirstuff is locked down, private,

(55:15):
no pictures, different usernamesacross the board but I found
everything to do with theirfamily and was able to find out
everything, including addresses,phone numbers, email addresses,
net worth, places of employment, where they went to school,
birth dates, and this, myparticular target, was

(55:39):
completely private.

Speaker 1 (55:42):
See, I love that you say that, because me and my
father have had thisconversation, because with
everything that here in the USthey've tried to do, which is
basically enact the Patriot Acton steroids, I mean him have a
conversations and he's in GRC.
He is one of those people thatshould know cybersecurity,
understand how privacy works,all this other stuff, and he

(56:04):
comes into.
Oh well, I have nothing to hide, so it doesn't matter.
Everybody has something to hide.
Everybody has something theydon't want the government to
know or they don't wantso-and-so to know.
So when you look at thesesituations, I look at it as it
doesn't matter what we do,matters what those connected to

(56:30):
us do.
And because those connected tous don't give it excuse me,
don't give it to him, it doesn'tmatter what you do To your
point, pull yourself offlinealtogether.
Nobody can tag you, nobody canfind you, you have no address to
your name.

Speaker 2 (56:49):
Yeah, that is the only way you will ever be
completely safe, but even then,still kind of out there.

Speaker 1 (56:58):
Well, it is because if they know your parents, they
know where they've lived, theyknow your surrounding area and
there will be pictures out thereyour parents, your sisters,
your siblings, your brother yoursister.

Speaker 2 (57:06):
Yeah, someone's gonna have a picture in the front
yard.

Speaker 1 (57:08):
Somebody's gonna have a picture that has shown where
you live, where you've been ator who you are.
Some way, shape or form, it'llget back to you.
This is why and I'm gonna haveyou give one little bit piece of
advice more after this but thisis why I say on occasion and

(57:28):
this is the first time I'm gonnasay it publicly on this show I
wish the whole power grid wouldfail sometimes and the internet
would go offline forever,because it has made it way too
easy for people to find peoplethat they don't need to be
finding, to include victims,true victims, and that is-.

Speaker 2 (57:49):
I mean, you heard about the situation that we had
to coordinate.
What was it a month ago now?

Speaker 1 (57:53):
Yeah, a little bit.
Yeah, that was fun.
So it is one of those things.
As much as I love technology, Ilove the internet Spies at the
same time.
Yeah, besides that, we arecoming to the top of the hour.
I'm gonna let Amanda give herfinal words here in a minute,
but if you wanna leave a superchat, you wanna leave a comment,

(58:14):
you wanna leave something,please go ahead and do so.
If you wanna donate to thecause, look if you're watching
this afterwards, I have tipsalso down below.
I could really use the money tokeep this show going.
I've been doing it for 100,some episodes, and YouTube
doesn't wanna fund me, so fuckthem.
It's all about you guys, allabout those who watch the show.
Otherwise, amanda, for thosegoing through Google

(58:40):
cybersecurity, for those tryingto break in, for those trying to
do anything, what advice wouldyou give them?
So you know how this show goes?
You tune in every week.

Speaker 2 (58:51):
I know, I know I gotta think.
I gotta think.
I mean just be ready to learn,ask the questions.
It's I mean I've heard it saidon here a bunch of times Like
when you first step through thatdoor, it is so overwhelming,

(59:13):
there's so much information thatyou kind of just need a
lifeline to navigate until youcan get your footing.
Like that's kind of like thebest way I can, best way I can
describe it, because, like Iforget who it was.
That was like it was a tidalwave of information.
I was like that is the mostaccurate thing I've ever heard
in my life.
I was so overwhelmed and it waslike actually kind of

(59:38):
questioning if this field wasmeant for me, until somebody
decided to send me a scam job onLinkedIn and I asked you how to
report them and by the time youresponded to me, I already
found their life story.

Speaker 1 (59:55):
I'm making a lot of.

Speaker 2 (59:56):
I owe you a lot of doing that kid.
Oh, but yeah, it's like learneverything.
You can Ask all of thequestions, Keep digging in
different areas to find moreabout something you don't
understand.

Speaker 1 (01:00:14):
And see, that's the biggest thing, right?
So in this career field, inthis industry, it's all about
questions.
It's all about asking thosequestions and not being afraid
to feel stupid, because, let'sbe honest, nobody is stupid in
this industry.
You just have a lack ofknowledge that you have not
learned yet.
If you have the ability tolearn it, if you're willing to
learn it, that is what isimportant to me.
Now I have reached out to a lotof people.

(01:00:36):
They know I am looking to do alot of big things here in the
future, so they know I don'tgive a damn where you come from.
I don't give a damn who you are.
I care about your passion andwillingness to grow in this
industry.
Amanda, I have some people I'mgonna reach out to.
Don't get me wrong.
I don't know if they still workin certain industries, but I'm

(01:00:56):
gonna find out and I'm gonnafind out and I'm gonna help you
out, because I want you tosucceed.
I want you to get to where youneed to be at.
Otherwise, look, hey, I loveeverybody who has tuned in this
week.
I love everybody that's beenhere every week, from Andrea to
Jenny to Space Tacos.
Yeah, I know who the fuck youare.
It's R&A Art, because I'm notpronouncing that entire name.

(01:01:18):
Monawa, andrea, you name it.
I love you all.
You're all amazing.
Jack, thank you for tuning inonce again, otherwise, look, you
can come back, you can leave atip, you can do super chats, you
can do all this shit.
You can also find me on oh, Idon't know my website down below
.
You're all amazing.
You're all beautiful people.
You all deserve to be here, andif somebody tells you otherwise

(01:01:41):
, please send them my way,because I'll straighten them out
, because that's what I do.
I love you all.
Take care, and I'll see younext week for another amazing
episode of Security Happy Hour.
Be safe.
Advertise With Us

Popular Podcasts

Crime Junkie

Crime Junkie

Does hearing about a true crime case always leave you scouring the internet for the truth behind the story? Dive into your next mystery with Crime Junkie. Every Monday, join your host Ashley Flowers as she unravels all the details of infamous and underreported true crime cases with her best friend Brit Prawat. From cold cases to missing persons and heroes in our community who seek justice, Crime Junkie is your destination for theories and stories you won’t hear anywhere else. Whether you're a seasoned true crime enthusiast or new to the genre, you'll find yourself on the edge of your seat awaiting a new episode every Monday. If you can never get enough true crime... Congratulations, you’ve found your people. Follow to join a community of Crime Junkies! Crime Junkie is presented by audiochuck Media Company.

24/7 News: The Latest

24/7 News: The Latest

The latest news in 4 minutes updated every hour, every day.

Stuff You Should Know

Stuff You Should Know

If you've ever wanted to know about champagne, satanism, the Stonewall Uprising, chaos theory, LSD, El Nino, true crime and Rosa Parks, then look no further. Josh and Chuck have you covered.

Music, radio and podcasts, all free. Listen online or download the iHeart App.

Connect

© 2025 iHeartMedia, Inc.