Pulp Librarian Profile picture
Jun 3, 2021 13 tweets 7 min read Read on X
If stock photography has taught us one thing it's how to recognise a hacker! But how much do we really know about these shady characters, with their ill-fitting balaclavas and their Windows 7 laptops?

Here's my essential stock photography guide to #cybersecurity...
First things first, hacking has come on leaps and bounds in the last few years. Backing up your sensitive data on C60 cassette and labelling it "Flock of Seagulls Megamix' is no longer enough to keep your information safe!
And hackers are actually very hard to spot. That's because they dress head-to-toe in black (or very very very dark grey) since they live on the Dark Web and want to blend into the background.
What hackers want from you is personal information. No matter how trivial it still has value to them - and they'll go to extrodinarily lengths to get it!
There are many types of hacker. Some are 'crackers': experts at breaking into networks. Their 'tell' is their habit of saying "I'M IN" in a deep voice once they've got past the firewall. Watch out for anyone you don't know using that phrase.
'Keystroke hacking' involves a criminal examine your keyboard in minute detail, often with a magnifying glass, to see which keys have the most pizza grease stains on them. It's only a matter of minutes before they've deduced what your password is.
'Shoulder surfing' is another popular hacker trick to find out your password. The criminal pretends to be examining dandruff on your shoulder, but in reality he's watching you type! Always shield your pin, or wear a blouse with huge shoulder pads to obscure their view.
Sometimes a hacker doesn't even need to be in the same room as you to access your data. He can 'infect' your computer with a virus, from distances of up to 12 feet. Popular viruses include worms, Trojans and spywear. Always wipe your screen with disinfectant to protect yourself.
Ransomwear is also a frequent hacker tactic. Instead of stealing your data they lock your computer and charge you several 'bit coins' to unlock it. Fortunately bitcoin looks like chocolate money, so try paying them with that: it's probably worth more now.
I know, traditionally we used to protect our computers by leaving a padlock on the keyboard, telling the hacker that we're wise to their tricks. However modern cyber criminals can by special 'keys' from the internet to unlock these. Nowadays you have to be more vigilant.
So to be safe online:
- Never share your computer with your family.
- Don't open emails if they look interesting.
- Always forget your password.
- If in doubt for God's sake don't click anything!
Hackers normally celebrate their success by doing the 'Hacker Haka', a traditional dance involving stamping of the feet and partitioning of the C drive. So if you don't want to cause their next celebration you'd best heed my #CyberSecurity hints!
The internet is very complex and can easily trap the unwary. So if you're still worried about 'netting' try mastering teletext first, or typing numbers into a calculator: it's much safer than making a big mistake online.

Stay safe everyone...

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Pulp Librarian

Pulp Librarian Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @PulpLibrarian

Jul 1
Today in pulp... I head back to 1977! Image
Ancient Astronauts: an Official UFO Special. November 1977. Image
Modesty Blaise: Last Days In Limbo, by Peter O'Donnell. Pan Books, 1977. Image
Read 29 tweets
Jun 30
The Muppet version of Apocalypse Now...

"I wanted a mission. And for my sins they gave me one."
Image
Image
"Your mission is to proceed up the Nung River by Navy patrol boat, pick up Colonel Kurtz's path at Nu Mung Ba, infiltrate his team by whatever means available... and terminate the Colonel's command."
Image
Image
"Terminate with extreme prejudice."
Image
Image
Read 9 tweets
Jun 29
People who feel they have no voice can have a powerful creative spark, sometimes born of suffering or solitude. Mostly it's hidden, but in the 20th century it began to be admired, celebrated, and even perhaps exploited.

Let's look at the story of 'Outsider Art'... Image
Outsider Art, Art Brut, Visionary Art, Naïve Art: nobody has really settled on a name for artworks made by untrained artists which express a raw, energetic experience of the world. It's art from a different perspective, demanding to be heard. Image
Outsider Art began to be recognised in 1911 by Der Blaue Reiter group of artists in Munich. The group was short-lived but influential: fundamental to Expressionism and admiring of artworks created by people struggling with their mental health. Image
Read 19 tweets
Jun 27
Today in pulp... a few quizzes! Image
Are you ready for marriage? (1951) Image
Will YOU make a good lover? (1947) Image
Read 11 tweets
Jun 23
Today in pulp... I look back at '70s Argentinian superspy Namur, a lady who lives her life by the motto "Peligro Supremo!" Image
Namur is something of a mystery. She's an FBI agent who uses her unique martial arts skills to fight crime. However she always wears a mask to protect her identity. Image
Namur's boss at the FBI is the equally mysterious 'Taurus' who hides his identity behind a fan. It's such a secretive world fighting crime... Image
Read 12 tweets
Jun 22
Today in pulp I take a look at back at the humble office copier!

It's a godsend to the busy office worker working on their debut novel... Image
The Victorian office of the future had a mimeograph machine. You turned the handle and it sharpened your pencils so you could hand copy better.

At least I think that's how it worked... Image
The Belle Époque French copied their documents with the Cyclostyle machine. Here a typical administrator explains its function to his enthused colleagues. Image
Read 13 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us!

:(