Jack Recider
👤 PersonAppearances Over Time
Podcast Appearances
I remember the first time I posted something online. It was a video game guide in the 90s. And there's an internet adage that I think is true. It goes like this. The best way to get the right answer on the internet is not to ask a question, but to post the wrong answer. I posted a guide on how to beat a video game, and it immediately got downvoted, mocked, ridiculed, and I was told to get good.
I remember the first time I posted something online. It was a video game guide in the 90s. And there's an internet adage that I think is true. It goes like this. The best way to get the right answer on the internet is not to ask a question, but to post the wrong answer. I posted a guide on how to beat a video game, and it immediately got downvoted, mocked, ridiculed, and I was told to get good.
At first, I thought they were joking, like I've beaten this game a hundred times with this strategy. What are you talking about? Get good. But then after some pushback, they started cluing me in, telling me exactly where my advice was wrong and giving me tips on how to properly do those parts of the game. I was blown away. What I thought was impossible to do in the game, people were actually doing.
At first, I thought they were joking, like I've beaten this game a hundred times with this strategy. What are you talking about? Get good. But then after some pushback, they started cluing me in, telling me exactly where my advice was wrong and giving me tips on how to properly do those parts of the game. I was blown away. What I thought was impossible to do in the game, people were actually doing.
Now, dear listener, this experience shaped me for who I am today. If you post something genuinely helpful online and people mock you, that could be the end of you ever posting anything online again. It's enough to ruin your self-confidence and hate everyone online. But I had the opposite reaction. I loved this game and played it thousands of times.
Now, dear listener, this experience shaped me for who I am today. If you post something genuinely helpful online and people mock you, that could be the end of you ever posting anything online again. It's enough to ruin your self-confidence and hate everyone online. But I had the opposite reaction. I loved this game and played it thousands of times.
They were giving me tips and strategies on how to be way better than my best strategy that I had. And I genuinely wanted to be way better. Not only that, I got to make friends with other people who were really passionate about this game. It was an amazing experience. Fast forward to today. We're 150 episodes into this podcast. That's 134 hours of me yapping.
They were giving me tips and strategies on how to be way better than my best strategy that I had. And I genuinely wanted to be way better. Not only that, I got to make friends with other people who were really passionate about this game. It was an amazing experience. Fast forward to today. We're 150 episodes into this podcast. That's 134 hours of me yapping.
I've got a lot of feedback over the years. Most of it is positive. But today, today I've got to correct something I got wrong. Really wrong. These are true stories from the dark side of the Internet. I'm Jack Recider. This is Darknet Diaries. This episode is sponsored by ThreatLocker.
I've got a lot of feedback over the years. Most of it is positive. But today, today I've got to correct something I got wrong. Really wrong. These are true stories from the dark side of the Internet. I'm Jack Recider. This is Darknet Diaries. This episode is sponsored by ThreatLocker.
Ransomware, supply chain attacks, and zero-day exploits can strike without warning, leaving your business's sensitive data and digital assets vulnerable. But imagine a world where your cybersecurity strategy could prevent these threats. That's the power of ThreatLocker, Zero Trust Endpoint Protection Platform. Robust cybersecurity is a non-negotiable to safeguard organizations from cyberattacks.
Ransomware, supply chain attacks, and zero-day exploits can strike without warning, leaving your business's sensitive data and digital assets vulnerable. But imagine a world where your cybersecurity strategy could prevent these threats. That's the power of ThreatLocker, Zero Trust Endpoint Protection Platform. Robust cybersecurity is a non-negotiable to safeguard organizations from cyberattacks.
ThreatLocker implements a proactive, deny-by-default approach to cybersecurity, blocking every action, process, and user unless specifically authorized by your team. This least-privileged strategy mitigates the exploitation of trusted applications and ensures 24-7, 365 protection of your organization.
ThreatLocker implements a proactive, deny-by-default approach to cybersecurity, blocking every action, process, and user unless specifically authorized by your team. This least-privileged strategy mitigates the exploitation of trusted applications and ensures 24-7, 365 protection of your organization.
The core of ThreatLocker is its Protect suite, including application, allow listing, ring fencing, and network control. Additional tools like the ThreatLocker detect EDR, storage control, elevation control, and configuration manager enhance your cybersecurity posture and streamline internal IT and security operations.
The core of ThreatLocker is its Protect suite, including application, allow listing, ring fencing, and network control. Additional tools like the ThreatLocker detect EDR, storage control, elevation control, and configuration manager enhance your cybersecurity posture and streamline internal IT and security operations.
To learn more about how ThreatLocker can help mitigate unknown threats in your digital environment and align your organization with respect and compliance frameworks, visit ThreatLocker.com. That's ThreatLocker. Locker.com. This episode is sponsored by Exonius. Complexity is inevitable in IT and security, and it's increasing. Exonius is here to help you control it.
To learn more about how ThreatLocker can help mitigate unknown threats in your digital environment and align your organization with respect and compliance frameworks, visit ThreatLocker.com. That's ThreatLocker. Locker.com. This episode is sponsored by Exonius. Complexity is inevitable in IT and security, and it's increasing. Exonius is here to help you control it.
As a system of record for all digital infrastructure, the Exonius platform correlates asset data from existing tools to provide an always up-to-date inventory, uncover security gaps, and automate response actions. Go to exonius.com slash darknet to learn more and get a demo that's spelled A-X-O-N-I-U-S. Exonius.com slash darknet. Over the years, one episode I've published has haunted me.
As a system of record for all digital infrastructure, the Exonius platform correlates asset data from existing tools to provide an always up-to-date inventory, uncover security gaps, and automate response actions. Go to exonius.com slash darknet to learn more and get a demo that's spelled A-X-O-N-I-U-S. Exonius.com slash darknet. Over the years, one episode I've published has haunted me.