Who was REALLY behind the Microsoft Backdoor [PART 2]

Поділитися
Вставка

КОМЕНТАРІ •

  • @DanielBoctor
    @DanielBoctor  6 місяців тому +6

    To try everything Brilliant has to offer -free- for a full 30 days, visit 👉 brilliant.org/DanielBoctor/. You'll also get 20% off an annual premium subscription!
    PART ONE 👉 ua-cam.com/video/9KfY1hlibZ0/v-deo.html
    THANKS FOR WATCHING ❤
    JOIN THE DISCORD! 👉 discord.gg/WYqqp7DXbm
    👇 Let me know what type of content you would like to see next! 👇
    Thank you for all of the support, I love all of you

  • @VADemon
    @VADemon 6 місяців тому +324

    I didn't think it was possible to explain an exploitation so clear and concise in a video format. Props! Demystifying technology is the first step in education imho.

    • @DanielBoctor
      @DanielBoctor  6 місяців тому +15

      thanks for the support! means a lot ❤️

    • @everythingpony
      @everythingpony 6 місяців тому +1

      I'm still confused on why we are against them for finding and telling of an issues, malwarebytes and others do it?

    • @entx8491
      @entx8491 6 місяців тому

      Stop saying "we" to stop the confusion ​@@everythingpony

    • @Dong_Harvey
      @Dong_Harvey 6 місяців тому +2

      ​@@everythingponybecause the US state department needs some way to defend genocide

  • @davidkanimation
    @davidkanimation 6 місяців тому +37

    I am highly impressed. I work in IT but more from a troubleshooting helpdesk standpoint, not as a programmer or cyber expert. I could only follow along conceptually, however I was pleasantly surprised I was able to follow this to the degree someone who lacks the education in the baseline elements involved could follow. That is not only highly appreciated, but a testament to your ability to craft a story of the information, and to perfectly time recap moments of a previous points to reiterate their importance to that step and help the information sink in. Even more beautiful was that you don't overwhelm the viewer with graphics which would actually go against the absorbing of the information, and the simpler animations effectively portray the concepts while letting us focus on the information it's portraying. I looked to subscribe at the end, and hadn't even realized I had already subscribed mid-video.

    • @alphabeta3528
      @alphabeta3528 5 місяців тому

      Good for you 😊

    • @douwemusic
      @douwemusic 2 місяці тому

      ​@@alphabeta3528truly a reply to their comment

  • @nervegun5785
    @nervegun5785 6 місяців тому +102

    by the time it's revealed that SrvNet contains a pointer to a function, it's all over man...... it's always the freaking callback handler

    • @slovakthrowback3738
      @slovakthrowback3738 6 місяців тому +25

      It is crazy how much dramatic suspense can be bundled into some squares representing memory on a computer heh

  • @PavelBader
    @PavelBader 6 місяців тому +102

    No way, I just watched the first part and here’s the second part, posted 20 minutes before 😮 Thanks for the video!

    • @DanielBoctor
      @DanielBoctor  6 місяців тому +7

      haha, perfect timing. thanks for watching 😊

    • @cynth0984
      @cynth0984 6 місяців тому

      I was hacked by ytb algorithms the same way to watch them both :)

    • @darioriccio5342
      @darioriccio5342 6 місяців тому

      Literally the same eheh😅

  • @Scarhandtunes
    @Scarhandtunes 6 місяців тому +55

    This is an absolutely unbelievable breakdown.

  • @MrModuleAutoElectrical
    @MrModuleAutoElectrical 6 місяців тому +8

    You can tell someone has such a good understanding of something when they can explain it so well to someone with limited knowledge, and they walk away feeling like they completely understand how it works.
    I've got basic knowledge of the C language and understand computers use memory and execute code, I used SMB to watch a movie file from my computer on my TV once, that's about it. I've never written a Windows application. Yet I now undertake how wannacry worked.
    Thank you

  • @admcstabby
    @admcstabby 6 місяців тому +4

    Daniel: "We now have all the ingredients needed to understand how everything comes together"
    Me, a Network Engineer: "Ah yes. so hackers have to byte the bug who bit into memory and created a word hole in my page"

  • @Draco_Alpha
    @Draco_Alpha 6 місяців тому +13

    this is really a clever attack... i'm impressed with it, that's for sure. thanks for producing this!

  • @brianjirvin
    @brianjirvin 6 місяців тому +86

    So at what point do we talk about Kaspersky?

    • @garr_inc
      @garr_inc 5 місяців тому +10

      That's the neat part! We don't.

  • @phoneywheeze
    @phoneywheeze 6 місяців тому +130

    crazy how Kaspersky got banned recently

    • @zestiny_
      @zestiny_ 6 місяців тому +7

      crazy how they stole the program and somehow the "hackers" got them not sure why he left that part out

    • @zemm9003
      @zemm9003 6 місяців тому +43

      ​@@zestiny_ that's not what happened (he addressed it in the first video). You seem to have problems understanding spoken English. Probably not your first language.

    • @TheColonThree
      @TheColonThree 6 місяців тому +23

      ​@@zemm9003Or maybe it is their first language but the person just lacks basic comprehension. There's a lot more people like that than you think. 😂

    • @lmnk
      @lmnk 6 місяців тому +2

      That's pretty much why it was banned I feel.

    • @zestiny_
      @zestiny_ 6 місяців тому +1

      @@zemm9003 nope. he omitted that part kid

  • @BobertV702
    @BobertV702 6 місяців тому +21

    Thanks for the second part. Really informative and interesting to get the inner workings of the 3rd bug and how the payload gets executed :)

  • @randomstuff_21
    @randomstuff_21 6 місяців тому +13

    How do people in charge, with all the worlds resources, get absolutely embarrassed like this?

    • @gzoechi
      @gzoechi 6 місяців тому

      Our tax money allows them to hire the smartest, but they are still just people.

    • @audacityhour3104
      @audacityhour3104 6 місяців тому +3

      Seduction

    • @randomstuff_21
      @randomstuff_21 6 місяців тому

      @@audacityhour3104 🤣

    • @Ungood-jl5ep
      @Ungood-jl5ep 6 місяців тому +6

      The people in charge are inept. "the powers that be" get way too much credit for everything, it's an affect of the constant info ops.

    • @gzoechi
      @gzoechi 6 місяців тому +3

      @@Ungood-jl5ep They might not be inept, but they have much different goals than what they say or what we wish they had.

  • @glitchy_weasel
    @glitchy_weasel 6 місяців тому +1

    This video is as beautifully crafted as EternalBlue 😁
    Really, fantastically done! I find that this two part series was the perfect balance between technical knowledge but not overly difficult to understand. Would love more exploits breakdowns like these!

  • @JamieBainbridge
    @JamieBainbridge 6 місяців тому +4

    If I had RCE on every Windows box I would launch Space Cadet pinball so people can have fun

  • @wokky02
    @wokky02 6 місяців тому +41

    Isn't it interesting how the feds indicted those who used it, but no one sued the creators (enn ess ay) for losses due to them creating the code for the exploit then allowing themselves to get hacked (irony) and the exploit leaked...

    • @ridottech1902
      @ridottech1902 6 місяців тому +22

      if anyone sued them, then your laptop will miraculously have Capture Point(read the initials) all over it.

    • @kuroenekodemon
      @kuroenekodemon 6 місяців тому

      Also just to add onto this there’s a clause in the US Constitution that makes it impossible to sue to US Government and get monetary damages. So if I’m seeing this right the real reason Kaspersky got banned was because they found out about this disgusting worm…

    • @melodynice7938
      @melodynice7938 6 місяців тому +1

      Quod licet lovi, non licet bovi. 😮

    • @cinderwolf32
      @cinderwolf32 6 місяців тому +3

      I think they should be held accountable for their own security failure, but not for creating the exploit. Otherwise, every security researcher would also be a criminal. But security researchers are not criminals, and the work done to discover modes of exploitation along with proofs of concept are needed to harden security in the first place. Unless you can prove it was being used by them, they hadn't done anything wrong yet (although I personally 100% believe they either did, or intended to)

    • @jonathanherrera9956
      @jonathanherrera9956 6 місяців тому +6

      @@cinderwolf32 I disagree, you are right that the point of finding exploits is to harden the system. But the NSA didn't inform about the exploit until after it leaked, which means they were helding it (and maybe using it) as a weapon.

  • @ZakHooiTM
    @ZakHooiTM 6 місяців тому +4

    Small tip, have the NT5x source at hand while watching this video. It will give a picture how the functions are written, including warnings that the os2fealist conversion function doesn't check stuff much itself, it's duty of the caller to do that

  • @dsf190
    @dsf190 6 місяців тому +5

    This is such a cool video, thank you for the in-depth breakdown. I am completely blown away by the complexity of this backdoor

  • @xavi_6767
    @xavi_6767 6 місяців тому +23

    Damn. My brain hurt.
    I am too dumb for these stuff not gonna lie.

    • @Corteum
      @Corteum 6 місяців тому +7

      Well, you just keep telling yourself that story and see where it goes... lol

    • @kevinscales
      @kevinscales 6 місяців тому

      You are not dumb, you just haven't learnt all you need to know yet. Keep hurting your brain until you understand what you want to understand and don't put yourself down for not understanding without effort because this is exactly what you have to do to improve.

    • @ridottech1902
      @ridottech1902 6 місяців тому +7

      I said the same thing. I said that I'm too dumb for OS dev. Well now it's my job

    • @nothingnothing1799
      @nothingnothing1799 6 місяців тому +3

      If this interests you there are multiple websites and resources to learn, its starts out simple so most anyone can learn something, and if you so happen to have the right kind of mind you should be able to learn all of this you just gotta put in the time

    • @Dullahan_1
      @Dullahan_1 5 місяців тому

      @@nothingnothing1799 where

  • @marsovac
    @marsovac 6 місяців тому +50

    Classic.
    USA: "It was North Korea".
    USA: "It was Russia".
    Russia hacks the NSA: "It was the USA".

    • @-kingofsaiyannappa-9057
      @-kingofsaiyannappa-9057 5 місяців тому +3

      *China has left the chat*

    • @HansJuergen-ps8bt
      @HansJuergen-ps8bt 5 місяців тому +11

      If history tells you something: "It was the USA." is a phrase that comes up waaaaay too often for most Americans liking probably. But if you are betting man and the USA is in the game of possible culprits, odds are the best way to multiply your investment is to bet on the good ol' USA.

    • @amiablereaper
      @amiablereaper 2 місяці тому +2

      ​@@HansJuergen-ps8bt tbqh it was literally the usa this time. The NSA found critical vulnerabilities in windows and neglected to inform Microsoft until someone else stole it. We don't know when the nsa discovered these vulnerabilities, but Microsoft could have had years of additional time to fix these exploits if the nsa didn't get too attached to their new toys.

  • @chickeningay
    @chickeningay 6 місяців тому +9

    I love your videos man, always makes me sit down, get a snack and lock in.

    • @DanielBoctor
      @DanielBoctor  6 місяців тому +4

      haha, do I really make that type of content now? I'm honoured. love to hear it 😊

  • @Luca-gb1og
    @Luca-gb1og 2 місяці тому

    Im so happy that I found you! You make such interesting and good videos! Keep them coming

  • @lucretius1111
    @lucretius1111 6 місяців тому +2

    Just came across this channel and I love the content! Incredibly fascinating and very well explained.

  • @nickbeaumont2601
    @nickbeaumont2601 5 місяців тому

    the way these exploits are crafted is genuinely impressive. like how many lines of code do you need to comb through to find a faulty IF statement?

  • @RonKan69
    @RonKan69 6 місяців тому +17

    Great video! been looking for an explanation of the exploit for a long time now and youtube's algorithm suggested the perfect video

    • @DanielBoctor
      @DanielBoctor  6 місяців тому +3

      love to hear it!

    • @zestiny_
      @zestiny_ 6 місяців тому +3

      @@DanielBoctor Why did you exclude that kaspersky stole the program from the nsa worker and somehow "hackers" go ahold of the program. You omitted that important information in part 2. I can only assume you purposefully did that considering how much research you did for this video

    • @MadeAlurik
      @MadeAlurik 6 місяців тому

      @@zestiny_you should more upset that the governments around the world are exploiting hardware, and software, and not notifying the corporations of it, keeping us less secure with our information.
      Who gives a fuck how we found out.

    • @fattymcboomboom9254
      @fattymcboomboom9254 6 місяців тому

      f isnotreal

  • @Luggruff
    @Luggruff 6 місяців тому +2

    So, is there a third part coming where you mention how Kaspersky is relevant? Or did you just completely forget the title of the first video? By the way, maybe make the title of the videos xyz - part 1/2 etc so it is clear that they belong together.....

  • @persevere1052
    @persevere1052 6 місяців тому +2

    Pleeease keep putting out more such bangers!

  • @Hazik_YouTube
    @Hazik_YouTube 6 місяців тому +9

    Video name" Who was really behind the largest computer worm"
    Proceeds to provide detailed technical explaination how it works only a bunch of niche experts can grasp

    • @gophop
      @gophop 5 місяців тому

      Any beginner Windows developer can understand this.

  • @strax8915
    @strax8915 6 місяців тому +2

    Amazing video that somehow manages to simplify such a complex exploit so that even a beginner (like myself) could understand it!
    I did, however, get a little bit lost in the end and have a question regarding the final parts of the exploit. How does it send the payload and then control where it ends up? Does it get sent via the (overflown) ntfealist?

  • @jsilverhand1988
    @jsilverhand1988 6 місяців тому +2

    Keep it up, man! Love your channel :)

  • @madarauchiha4298
    @madarauchiha4298 6 місяців тому +2

    I like how you break this down

  • @RGSTR
    @RGSTR Місяць тому

    Thank you, that is very nicely explained! I have been curious how that attack had worked.

  • @sakoasklaksd
    @sakoasklaksd 6 місяців тому +2

    I didnt understand anything, can someone tell me why Kaspersky got banned ?
    Did kaspersky found out that USA and Microsoft having backdoors to everyone ?

  • @spacewolfjr
    @spacewolfjr 5 місяців тому

    When adjusting the MDLs in the SRVNET struct, how do they know/predict where the HAL's heap is going to be?

  • @juliusreycalderon1998
    @juliusreycalderon1998 6 місяців тому +2

    Few cases where YT algo is really helpful. New sub here! 🥰

  • @zan1971
    @zan1971 6 місяців тому +2

    So what does Kaspersky have to do with this? And I heard something about "if you are using an os before windows 8" in the video. Who even still uses that?

    • @elpiibemaravilla
      @elpiibemaravilla 5 місяців тому +2

      several endpoints, servers, ATMs, you name it. There are tons and tons of equipments that hasn´t been updated over the years and they are vulnerable to this. I would dare to bet that more than 50% of the companies out there still have legacy OS in their inventory

  • @SB-qm5wg
    @SB-qm5wg 6 місяців тому +1

    Excellent deep dive 👏

  • @petevenuti7355
    @petevenuti7355 6 місяців тому +1

    So because I had no need for older versions of SMB and remove them from my system after getting rid of Windows for workgroups 3.1 , and using novel protocols to communicate between os2 and NT instead of SMB is why I wasn't attacked?

    • @fomxgorl
      @fomxgorl Місяць тому +1

      probably. less code means a smaller attack vector in most cases

  • @acedelgado1770
    @acedelgado1770 6 місяців тому +1

    I really enjoyed this, thanks for the video!

  • @sangeetguha51
    @sangeetguha51 6 місяців тому +1

    great video as always :)

  • @stevengill1736
    @stevengill1736 6 місяців тому +2

    Hey NSA, thanks a lot! Adds insult to injury, doesn't it?

  • @mikediscipleofJesusChrist
    @mikediscipleofJesusChrist 5 місяців тому

    This WAS SO CLEAR!!!

  • @clytle374
    @clytle374 6 місяців тому +6

    Not a hacker, security expert, or even a decent programmer. But are we assuming the NSA found all these vulnerabilities without the source code?

    • @Vizaru
      @Vizaru 6 місяців тому +5

      they 100% had the source code for Windows. now how they got it, I don't know. probably decompiled it themselves.

    • @ahmedabdul-aziz1562
      @ahmedabdul-aziz1562 6 місяців тому +5

      I was thinking about this for the entirety of this video. How the hell do you know of this very specific exploit? They must have had the source code one way or another because this depends on deep analysis of the source code that even regular SASTs won't identify.

    • @gophop
      @gophop 5 місяців тому +1

      Hire former MS devs. Bribe them / threaten them. Or / and do the same to MS. The romanticism fades when you realize it's just thugs leveraging their monopoly on violence and someone else' tax money.

  • @damionyates4946
    @damionyates4946 5 місяців тому

    Why on earth did it still contain ancient OS2 compatibility?

  • @stonedoubt
    @stonedoubt 6 місяців тому +1

    Nobody wants their back door to leak

    • @HyrimBot
      @HyrimBot 5 місяців тому

      we don't eat there anymore.

  • @Foukez
    @Foukez 6 місяців тому +5

    Wait for copilot

    • @Vizaru
      @Vizaru 6 місяців тому +4

      recall will undoubtedly be responsible for a major security/data breech

  • @danailminchev4685
    @danailminchev4685 6 місяців тому

    Fantastic work. Thanks.

  • @nocredits8066
    @nocredits8066 6 місяців тому

    Commenting to help with the algorithm cuz yeeeah! the video is so clear to explain everything, from the edition, animations, and script

  • @mattp7437
    @mattp7437 22 дні тому

    Hey Daniel, any new videos in the works? Love your channel.

    • @DanielBoctor
      @DanielBoctor  21 день тому

      funny timing on this, I actually have a new video coming out tomorrow, haha. glad you like my videos!

  • @code-inc
    @code-inc 6 місяців тому

    Highly detailed ❤ thanks 😘😘😘

  • @deancatiil4911
    @deancatiil4911 6 місяців тому +1

    can you do the Solarwinds hack

  • @albertobueno7805
    @albertobueno7805 6 місяців тому

    amazing video!

  • @wendysburgers4326
    @wendysburgers4326 6 місяців тому

    Can you prevent this by DISABLING Paging File (Pagfile Sys)?

    • @D0Samp
      @D0Samp 6 місяців тому +4

      No. This exploit used memory from the non-paged pool, i.e. kernel memory that is never swapped out to disk.

  • @MohanadSaid-u8x
    @MohanadSaid-u8x Місяць тому

    someone needs to tell me why some youtubers stop uploading after hitting million views
    insane quality would love to see more

    • @DanielBoctor
      @DanielBoctor  21 день тому +1

      luckily for you, I have another video coming out tomorrow, haha. I appreciate the support

    • @MohanadSaid-u8x
      @MohanadSaid-u8x 21 день тому

      @@DanielBoctorYooooooo the legend is back!
      Leaving the notifications on !

  • @pedrogorilla483
    @pedrogorilla483 6 місяців тому

    My man got scared and changed the thumbnail

  • @alexhannah8889
    @alexhannah8889 5 місяців тому

    Gotta hate Advanced Persistent Threats. I liked it more when hacker groups where small, isolated, and didn't have millions of dollars and an intelligence apparatus.

  • @jasonswearingin1009
    @jasonswearingin1009 6 місяців тому +13

    Not surprised over several years now all YT channels that "test" security software really hate Kaspersky Avast and AVG. When in 23 years of personal experience these were and still are the best consumer grade security software companies on the planet! Low system resource impact (NO BUILT IN ROOTKITS) and actual people on the customer service end! Plus Windows Defender is a pile of donkey shit!

  • @zandermcnabb7779
    @zandermcnabb7779 6 місяців тому

    ….. I just custom-deployed a windows server with SMB enabled, thank god it’s sandboxed

  • @kam1234554321
    @kam1234554321 6 місяців тому +21

    Haven't I just watch this video recently? It's 98% of the previous video...

    • @VADemon
      @VADemon 6 місяців тому +4

      I added the first two minutes as Recap to _Sponsorblock_ to skip.

    • @menno763
      @menno763 6 місяців тому +1

      Yeah it should have been one video.. Still great content tho!

    • @RowanHawkins
      @RowanHawkins 6 місяців тому +1

      There is a video size limit on YT for newer/smaller subscriber count videos. However checking after I've made this post this exceeds the subscriber count for that to be an issue.

    • @VADemon
      @VADemon 6 місяців тому +4

      @@RowanHawkins This limit (15min initially) could be removed by adding a phone number and this worked like that about 15 years ago.
      Assuming he's partaking in the ad revenue (AdSense) he has had limits disabled a very long time ago.

    • @hotlinefrenzy
      @hotlinefrenzy 6 місяців тому +1

      ​@@VADemon But you aren't Daniel?

  • @TonyFarley-pv3nk
    @TonyFarley-pv3nk 6 місяців тому

    Then we have this closed-door session was not even my state or me to be allowed in this session of the reliant

  • @cariyaputta
    @cariyaputta 6 місяців тому +27

    CIA, NSA, and Israel.

    • @gregandark8571
      @gregandark8571 6 місяців тому +1

      Israel = FBI,CIA,KGB,FSB etc,etc,etc ...

  • @jacoblee5190
    @jacoblee5190 6 місяців тому

    Did you just change title?

  • @greenerell484
    @greenerell484 6 місяців тому

    good explanation

  • @taahaseois.8898
    @taahaseois.8898 6 місяців тому

    Is this a reupload? I swear I've seen this video already...

  • @Collin0
    @Collin0 6 місяців тому

    great video

  • @powerdust015lastname4
    @powerdust015lastname4 6 місяців тому +2

    4:40 skill issue, shouldve used rust

  • @klaatubob
    @klaatubob 6 місяців тому

    The repeated references to OS/2, an OS that hasn't been used in decades, lost me. What am I missing?

    • @elecblush
      @elecblush 6 місяців тому +2

      Compatibility.
      The crux of the exploit is that it's in the oldest version of SMB. And that code had compatibility code to be able to communicate with OS/2 machines.
      This is also probably why the inventors of this exploit found it. They looked specifically for old code and protocols written at a time with a lot less knowledge about these types of attacks.

    • @klaatubob
      @klaatubob 6 місяців тому

      @@elecblush thanks for the explanation

  • @TonyFarley-pv3nk
    @TonyFarley-pv3nk 6 місяців тому

    Do you think your boy scout patches teach this understanding correctly do you think they provided y'all with the full rotation to get this understood in case someone else comes out as a problem what do you think they just learned how to money everybody through it

  • @TonyFarley-pv3nk
    @TonyFarley-pv3nk 6 місяців тому

    A lot of things made some plays some big areas after that Xbox got switched out started all this controlled removal around my area

  • @RickySupriyadi
    @RickySupriyadi 6 місяців тому

    coincidentally? i rumor they already got an AI model able to decrypt cryptography.... gossips though but this gossips really aligned with the leaks, leak it to test this specialized AI capabilities in real life!

  • @dallasbowman9532
    @dallasbowman9532 6 місяців тому

    I just finished Andy Greenberg's "Sandworm" last week - well timed, for sure, but man, what a video! Thanks for making this, this is kickas$!

  • @Litepaw
    @Litepaw 6 місяців тому

    Gets*

  • @TonyFarley-pv3nk
    @TonyFarley-pv3nk 6 місяців тому

    So here's another problem I y'all are asking for hackers and you all know the consequence

  • @charlesbenca5357
    @charlesbenca5357 6 місяців тому +2

    wow.

  • @mitkomanev9783
    @mitkomanev9783 6 місяців тому

    Spoiler alert... there's worst one (let's say one) for bluetooth! Just take a look at you services, than your devices (hidden ones too) and do the thinking yourself ;)

  • @ce9916
    @ce9916 6 місяців тому

    Is HTML programming a good place to start to become a cyber security expert?

  • @TonyFarley-pv3nk
    @TonyFarley-pv3nk 6 місяців тому

    How's the worm in your head Mr Kennedy

  • @leshommesdupilly
    @leshommesdupilly 6 місяців тому +4

    Moral of the story kids: just use pencil and paper next time

  • @TonyFarley-pv3nk
    @TonyFarley-pv3nk 6 місяців тому

    So one of my next questions is through some of this understanding of this worm what does concept of cancer or whatever it is going around and our big organizations trying to prevent the next big terrorist attack. Do you suspect we've already been hit with this attack

    • @TonyFarley-pv3nk
      @TonyFarley-pv3nk 6 місяців тому

      I always questioned back door conversations without the evidence being presented

  • @nittani.
    @nittani. 6 місяців тому +1

    Haha

  • @boxicknowsbest9100
    @boxicknowsbest9100 6 місяців тому +4

    who knew grooming could be so fun! :D

    • @C-aFilms
      @C-aFilms 6 місяців тому +5

      r/cursedcomments

  • @justyce_yt
    @justyce_yt 5 місяців тому

    EternalBlue... guess which American political party is blue? Hmmmmmm (lmao)

  • @TonyFarley-pv3nk
    @TonyFarley-pv3nk 6 місяців тому

    I'll be cracking up to I mean we had defense attorney Lloyd have to go in and get his head looked out we had Russian President Vladimir Putin have to go get his looked at then we had bad and son get himself in a little bit of trouble when traveling over on a laptop and y'all think y'all are going to force the change of the Constitution of America

    • @lmnk
      @lmnk 6 місяців тому +6

      ... are you high or sth ?

  • @jefferyholcombe5189
    @jefferyholcombe5189 6 місяців тому +1

    This is propaganda made to cover some criminals trax!

  • @stevenfranszen1032
    @stevenfranszen1032 Місяць тому

    Loved the video! Quick question SMBv3 similar chain via QUIC protocal used in place of OS/2 would leave anyone with internet open to attack? CVE-2024-8260,CVE-2024-43447

  • @spiderfight1897
    @spiderfight1897 6 місяців тому

    Me my b

  • @LinguisticMirage
    @LinguisticMirage 6 місяців тому +2

    bro you talk so SLOW

    • @hashtag9990
      @hashtag9990 6 місяців тому +14

      you know youtube supports adjusting playback speed?

    • @CoolTebza-eh7ig
      @CoolTebza-eh7ig 6 місяців тому

      Must remember UA-cam does pay this people unless they reach amount of viewers, so use what you have don't judge because already know it don't understand why you bother pointing it out hear 🙉

    • @uniqueprogressive9908
      @uniqueprogressive9908 6 місяців тому +5

      ok goldfish

    • @Amaroq64
      @Amaroq64 6 місяців тому +3

      Normally I would hate on someone for padding time to get more ad revenue, but this is extremely advanced computer science stuff. I'm a self taught programmer and I'm glad he explained it slowly.