• 0 Posts
  • 25 Comments
Joined 1 year ago
cake
Cake day: June 27th, 2023

help-circle



  • True, but I’m the context of the film, it was set in (then) current day, and at least partially tried to make him being left behind plausible in that context.

    Though honestly, with the way they showed the mix-up even back then, it’s plausible the same thing could happen with a kid now… If they look similar enough, and the parents were seriously distracted, it’s not like they have id for the kids or anything now. It’s parents dragging kids along and once you’re past security it’s basically the ticket agents glancing to make sure the number of people and number of tickets match.


  • I don’t think you could make a Deadpool 1 again because they never made a Deadpool 1. You could easily make Deadpool again, they do that all the time and it kind of sucks because you have to label it like Deadpool (2016) and Deadpool (2024).

    Mostly you couldn’t make Deadpool today because it takes way, way longer than that to make a feature length film. Maybe you could do a YouTube short or something if you get started now. It’s already almost noon.




  • A benign scan could just be looking for an ftp server to connect to or a repeater or relay server of some sort. There are plenty of open services people make available for free and the fact that you would consider it an attack it doesn’t make it one.

    At minimum you could be alerted to look for someone attempting to connect to your ftp server with a single basic anonymous authentication vs someone flooding that port with known malicious software attacks, and block the latter across your entire network and effectively ignore the former. Really it seems like you’re advertising your lack of imagination in this context than a legitimate lack of possible uses for spoofing open ports.





  • At a guess, you might tell the difference between some benign scan and an attempt to actually take advantage of the port, perhaps to use as a trigger to automatically ban an ip address? or a way to divert malicious resources to an easy looking target so they are less available in other areas?

    The difference between someone scanning for open ports and someone attacking a port they find open seems significant enough to at least track and watch for patterns… Whether that’s useful for the majority of users or not is rarely why a feature is implemented.




  • Maybe think of it like one of those big walls of post office mailboxes…behind the wall is your computer and an app might be waiting for a message at box 22 or box 45678. You could close all the boxes and nothing could get in, or you could open one or all of them and allow people to deliver messages to them.

    If you connect your computer directly to the internet, anyone who knows your IP address could say 'deliver message X to port 22 at ip address <your ip address> and the program watching that box would get the message.

    If you put a router in the mix, and multiple computers, the router has the same block of boxes, but if someone sends a message to one of the boxes it just sets there. If you set up ‘forwarding’, sending a message to your ip address gets the message to the router, but if you forward box 22 from your router to a specific computer on your network, then the router takes a message at box 22 on itself and ‘forwards’ it to box 22 on whatever computer you specific (using internal ip addresses).

    You could map box 22 on your router to any other box on your computer…like port 22 coming into your router might get sent to port 155 on your computer…this is useful if you don’t want external people just exploring and lazily breaking into your computer using known vulnerabilities. Lots of ports are ‘common’, so an ftp hack on port 22 is easy, and might be ‘slightly’ harder if you tell your computer to actually look for ftp traffic on port 3333 or something.




  • not to justify bad behavior, but your points are rather off base. Thinking you’re superior to something doesn’t mean you hate it…One might consider themselves superior to plants and not hate them. One might consider Ford superior to Chevy and not hate Chevy. A woman can be misogynistic and consider males superior without hating females. Just because the 2 other points often come along for the ride doesn’t mean they are part of the definition and shouldn’t be asked.