Pulp Librarian Profile picture
Jun 3, 2021 13 tweets 7 min read Read on X
If stock photography has taught us one thing it's how to recognise a hacker! But how much do we really know about these shady characters, with their ill-fitting balaclavas and their Windows 7 laptops?

Here's my essential stock photography guide to #cybersecurity...
First things first, hacking has come on leaps and bounds in the last few years. Backing up your sensitive data on C60 cassette and labelling it "Flock of Seagulls Megamix' is no longer enough to keep your information safe!
And hackers are actually very hard to spot. That's because they dress head-to-toe in black (or very very very dark grey) since they live on the Dark Web and want to blend into the background.
What hackers want from you is personal information. No matter how trivial it still has value to them - and they'll go to extrodinarily lengths to get it!
There are many types of hacker. Some are 'crackers': experts at breaking into networks. Their 'tell' is their habit of saying "I'M IN" in a deep voice once they've got past the firewall. Watch out for anyone you don't know using that phrase.
'Keystroke hacking' involves a criminal examine your keyboard in minute detail, often with a magnifying glass, to see which keys have the most pizza grease stains on them. It's only a matter of minutes before they've deduced what your password is.
'Shoulder surfing' is another popular hacker trick to find out your password. The criminal pretends to be examining dandruff on your shoulder, but in reality he's watching you type! Always shield your pin, or wear a blouse with huge shoulder pads to obscure their view.
Sometimes a hacker doesn't even need to be in the same room as you to access your data. He can 'infect' your computer with a virus, from distances of up to 12 feet. Popular viruses include worms, Trojans and spywear. Always wipe your screen with disinfectant to protect yourself.
Ransomwear is also a frequent hacker tactic. Instead of stealing your data they lock your computer and charge you several 'bit coins' to unlock it. Fortunately bitcoin looks like chocolate money, so try paying them with that: it's probably worth more now.
I know, traditionally we used to protect our computers by leaving a padlock on the keyboard, telling the hacker that we're wise to their tricks. However modern cyber criminals can by special 'keys' from the internet to unlock these. Nowadays you have to be more vigilant.
So to be safe online:
- Never share your computer with your family.
- Don't open emails if they look interesting.
- Always forget your password.
- If in doubt for God's sake don't click anything!
Hackers normally celebrate their success by doing the 'Hacker Haka', a traditional dance involving stamping of the feet and partitioning of the C drive. So if you don't want to cause their next celebration you'd best heed my #CyberSecurity hints!
The internet is very complex and can easily trap the unwary. So if you're still worried about 'netting' try mastering teletext first, or typing numbers into a calculator: it's much safer than making a big mistake online.

Stay safe everyone...

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Pulp Librarian

Pulp Librarian Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @PulpLibrarian

Jan 23
In the shadowy corners of the shortwave spectrum lurk the Numbers Stations: strange radio broadcasts of mysterious blocks of numbers in creepy monotone voices!

It's actually an old form of spycraft which is still in use today. Let's take a listen...
A Numbers Station is a type of one-way voice link for sending information to spies in foreign countries. Operating on Short Wave radio bands they transmit a secret code of spoken numbers.

Use of Numbers Stations peaked during the Cold War, but some are still operating today. Image
Numbers Stations are operated by various national intelligence agencies. At set times on a pre-arranged frequency a musical tone is played, followed by a speech synthesised voice reading out blocks of numbers. To most listeners it sounds both creepy and meaningless. Image
Read 12 tweets
Jan 17
Today in pulp I revisit a mystery of the recent past: did ‘John Titor’ really travel back in time from 2038 to the year 2000 to warn us about an apocalyptic future? And why was he so keen on getting his hands on a 1975 IBM 5100 computer?

Let’s find out...
In 1998, US radio talk-show host Art Bell read out a fax from a man claiming to be from the future. Two years later the same man, calling himself Time_Traveler_0, left similar messages on the Time Travel Instutute’s internet forum.

They told a strange tale… Image
“Greetings. I am a time traveler from the year 2036. I am on my way home after getting an IBM 5100 computer system from the year 1975.”

For the next two years Time_Traveler_0, now calling himself John Titor, would leave many similar messages on internet forums. Image
Read 13 tweets
Jan 14
You know what we haven't done for a while? Bad book covers! Let's fix that...

('bad' has many different meanings by the way!) Image
The Best of Walter M. Miller, Jr. Pocket Books, 1980. Cover by Mara McAfee.

"Best," mind you! Image
Those are some epic "who farted?" faces.

A Vision Of Beasts: The Second Kingdom, by Jack Lovejoy. Tor Books, 1984. Cover by Victoria Poyser. Image
Read 18 tweets
Jan 7
The Bawdyguard, by John Dexter. Nightstand Books, 1971. Image
'John Dexter' didn't actually exist. It was a house alias - along with J X Williams - for a range of writers knocking out cheesy sex pulp for Greenleaf publishing. At least 20% of each novel had to be sex scenes with the other 80% titillation, voyeurism or padding. Not much space for character arcs or a hero's journey...Image
Greenleaf initially specialized in sci-fi magazines, until they discovered sex was selling better. A number of writers were quietly supplying novels for both scenes. Robert Silverberg, Harlan Ellison and Donald E Westlake all provides pseudonymous sex novels for the publisher. Image
Read 7 tweets
Jan 6
Today is the birthday of legendary illustrator Gustave Doré. Let's take a look back at his work... Image
Gustave Doré was born in Strasbourg on 6 January 1832. Aged 15 he became an illustrator for the satirical paper Le Journal Pour Rire. Image
Doré worked on a number of early text comics in the 1850s, including Trois Artistes Incompris et Mécontents and L'Histoire de la Sainte Russie. Image
Image
Read 15 tweets
Jan 5
Was Nancy Drew an '80s fashion icon?

Let's look in the files and find out... Image
Case 32: High Marks For Malice (1989). Nordic knits always work and they're great for detectives. Pastels are very flattering but you'll need a good lint roller if it's a long case you're investigating. This is a clear fashion win. Image
Case 51: A Model Crime (1990). Gold is a hard colour to pull off, but the details are on point here: single button and shoulder pads make it a power look and Nancy has sensibly avoided the '90s waitcoat trend. Another win. Image
Read 12 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us!

:(