Chapter
Clips
Clay uses hacker skills to outsmart a hacker and crack a password to gain access to a computer system.
33:55 - 36:54 (02:58)
Summary
Clay uses hacker skills to outsmart a hacker and crack a password to gain access to a computer system.
ChapterDatabase Security Measures
EpisodeEp 42: Mini-Stories: Vol 2
PodcastDarknet Diaries
The speaker discusses the steps they are taking to secure a compromised database, including taking down the database, changing the password, looking for evidence of back doors, and blocking the IP address of the attacker.
36:54 - 38:33 (01:38)
Summary
The speaker discusses the steps they are taking to secure a compromised database, including taking down the database, changing the password, looking for evidence of back doors, and blocking the IP address of the attacker.