{ "language": "en", "language_probability": 1, "duration": 5342.9635, "segments": [ { "id": 0, "text": " From my heart and from my hand, why don't people understand my intention? Computer running slow? Avoiding. Caught a virus? No! Does your computer seem to have a life of its own? Malfunction. Need input. The computer guru is here. I got you! Call in now. Now, it's Mike Swanson, your computer guru.", "start": 0.11, "end": 24.18, "words": [] }, { "id": 1, "text": " Hello and welcome to the Computer Guru Show. My name is Mike, here to deal with your technology needs and treat you like a person in the process. They say this is intelligent radio over on KVOI, but we'll prove them wrong for the next two hours. Because that's what we do. That's what we do. Yeah, just give us a call. 790-2040 if you'd like to be part of the show. That's 520-790-2040. This show will probably not be as exciting as last week's McCluskey show. I heard. Yeah. A little off the hook, but it was good. Yeah, yeah. But there's a rant today.", "start": 24.69, "end": 55.26, "words": [] }, { "id": 2, "text": " Which is good. Which is going to probably end up being like the whole show because I feel a little ranty as well. Oh, my goodness. So we'll have to start with some lighter subjects just to, you know, just to start things off on a gentle, not so angry. Yeah, I have some news that I'm actually excited to share. Oh, yeah? Yeah, it's about SpaceX, which, you know, is like my favorite thing ever. Yeah. So the Falcon 9 was reused successfully. And landed. Yeah. Again. That's incredible.", "start": 55.26, "end": 84.86, "words": [] }, { "id": 3, "text": " It's the first time a rocket has ever been reused like that, right? Yeah, and the first time that same reused rocket has landed twice. That's awesome. Very nice. This is step one into making space travel more sustainable and achievable. Right. Are you going to sign up to be one of the... If they would let me, I totally would. Because they say they're going to start taking tourists into space. Oh, I thought you meant just going to Mars and colonizing. Yeah, well, they're saying they're going to take tourists into space.", "start": 84.86, "end": 113.9, "words": [] }, { "id": 4, "text": " And in our lifetime, we're going to see people on Mars. If there's a way, I don't think I'll ever end up on Mars, but if there's a way to just get into even a low Earth orbit for not every cent I've ever made, I would totally do it. Or ever will make. I mean, think about it. If it was like $10,000, that's worth it. Yeah. Yeah, you could finance that. Or you could just save up for a year or two, you know.", "start": 113.9, "end": 136.72, "words": [] }, { "id": 5, "text": " Instead of those crazy people in suits that drive really hard bargains at car dealerships, they'll be outside the individual, let's launch you into Mars or into orbit. For what amounts to probably an hour of fun. I would imagine it's a little more than that. Some of which you may not actually remember because of the G-forces involved. Yeah. Did you hear that Stephen Hawking is going to be going into space?", "start": 136.72, "end": 165.44, "words": [] }, { "id": 6, "text": " Is he really? Yeah. The guy from Richard Branson from Virgin says that he wants to fly him up in one of his space planes. That's a dangerous proposal. Well, it'll be extremely low orbit. You know, basically, like, go up and there's the curvature of the Earth. You can say you're in space. Now let's go back down. Right. Let's not kill Stephen Hawking. Well, he said, Stephen Hawking said that he agreed immediately. I'm sure if he could choose his way to go out, it would be going into space. I would just prefer that we not kill Stephen Hawking.", "start": 165.44, "end": 195.25, "words": [] }, { "id": 7, "text": " I don't know. What if he wants to go out on his own terms? I guess. I guess. Maybe he's just trying to get back to his spaceship, which is orbiting the Earth right now. Maybe. You don't know. There's people who say that Stephen Hawking himself actually died several years ago, and the machine has just been puppeteering him like in Weekend at Bernie's for the last decade or so. It's really dark. I didn't expect that to go there. Okay. It's what I do.", "start": 195.31, "end": 223.97, "words": [] }, { "id": 8, "text": " That's what I bring to the show. Where did that come from? Wow, okay. Well, I'm in kind of a dark mood, Mike. Yeah, I can understand that. And I'm really starting to think about buying a ticket to Mars. I don't know, do you think the CIA will be on Mars? We're not going there until after the first break. We're just not. We're avoiding any acronyms until after the first break. No alphabet soup yet? No, no.", "start": 223.97, "end": 254.3, "words": [] }, { "id": 9, "text": " it'll just turn into a two-hour Mike's Angry. And we can't have that. Just can't have that. Did you see Google's little Maps April Fool's joke? Yeah, and I guess everybody, we should probably point that out, is that it is April 1st, and you're going to see all kinds of crazy things online. They're starting a day early, which is, I hate when they do stuff like that. It really annoys me, actually. Okay.", "start": 254.3, "end": 283.09, "words": [] }, { "id": 10, "text": " Like any time that Black Friday is getting progressively more just Thanksgiving Day. Right. Well, there's all these jokes that because everybody expects them now on April 1st, they're doing them like March 31st. Yeah, pretty soon. Everything's going to happen on January 1st. Everything. Black Friday. I just stay home. It's going to become the Purge Day. That's what's going to happen. It's January 1st every year. All right. Let's see what Mike has to say. Hey, Mike, how are you? Hey, good morning, guys. Good morning.", "start": 283.09, "end": 312.74, "words": [] }, { "id": 11, "text": " Love the show as always. I've got a problem with this SpaceX thing. Uh-oh. And I've got to tell you, I'm really into the SpaceX thing. Okay. I've done a lot of study on this. Did you guys watch the live feed when it was happening? I wasn't able to catch the live feed, but I've seen some of the videos since. Okay. I watched it four times. The very first time, everything was great. There was a satellite snafu, apparently, some kind of photo.", "start": 312.74, "end": 341.66, "words": [] }, { "id": 12, "text": " issue that i have with this whole thing back in 2015 if you go back to youtube and look at some of the videos where the uh this the second section comes down and lands on a barge right well they didn't show it this time yeah i heard that there was some i heard that there was an issue yeah yeah big issue here's why i don't believe that it landed on that barge oh really because they cut they cut the photo well excuse me they cut the video okay they said there was a", "start": 341.66, "end": 371.82, "words": [] }, { "id": 13, "text": " a camera issue, and all of a sudden, boom, there's this thing sitting on this barge. So you think there was some magic, some trickery? Listen, I'm not one of those kind of conspiracy guys, but something doesn't smell right with this thing. I mean, it could be. Companies have done worse, and I didn't see the live feed, so I can't really comment on it too much. Well, I was just looking for your guys' comment. I would say that while it kind of wouldn't...", "start": 371.82, "end": 399.23, "words": [] }, { "id": 14, "text": " Ultimately, I'm just a cynic, so it wouldn't surprise me too much if a company did something like that. I would like to believe that that's not the way it happened. Me too. I'd be very disappointed in Mr. Musk. You know what's crazy about this whole thing is that if you look at the 2015 feed on the YouTube where this second section comes down, it's like a pencil dropping out of the sky. Right, right. And it lands perfectly and stabilizes itself on this barge. There's almost no movement of the ocean. You can see the wave capping.", "start": 399.23, "end": 429.25, "words": [] }, { "id": 15, "text": " All this stuff, this thing doesn't even move. I got a problem with this. Well, I guess the good thing is that if it turns out that Elon's just pulling a really clever trick, we still have Blue Origin, which is the Jeff Bezos version of SpaceX. Yeah, yeah. Well, I hope it's real. I found it very strange that there was no other video feed. Zero. I've checked. I mean, I'll tell you that in light of recent leaks and all that stuff that we're going to talk about next segment,", "start": 429.25, "end": 459.58, "words": [] }, { "id": 16, "text": " unlikely to question any type of conspiracy I might hear in the next coming days. I'm open to everything now. Yeah, well, and I even hate to go there, but what I was concerned about is that with all the cameras, all of the technology, all the video stuff that's out there, no one has any video.", "start": 459.58, "end": 478.82, "words": [] }, { "id": 17, "text": " of this thing landing on that barge. Nobody. I mean, I would also say that, you know, it is a barge in the middle of the ocean with a rocket landing on it, so if something did happen to the video feed, it wouldn't surprise me greatly, but it could go either way. Okay. I'll let you know when I find out, Mike. We'll look into it. Yeah, I'll go watch the video again. Okay, cool. And by the way, what was the phone number to your computer shop? You can call us at 520-304-8300.", "start": 478.82, "end": 504.3, "words": [] }, { "id": 18, "text": " Okay, because I've got a problem with the printer, and I wanted to bring it by. So I'll catch you next week. All right. Sounds good, Mike. Thanks for the call. Okay. You guys have a good one. You too. Thank you. Bye. Thanks. Yeah, I hope that's not true. It could be. Companies have done stuff like that before. Yes, they have. Let's go ahead and fit this one in here. Hey, Phillip, how are you? Good morning. I bought a Galaxy tablet a while back, and now it's frozen on the screen. It won't shut off. It won't move, and I don't know what to do with it.", "start": 504.3, "end": 531.79, "words": [] }, { "id": 19, "text": " It's turned on, and I can't... There's two options here. You can hold down the power button longer, which will shut off. I tried that. So when you held the power button down, it didn't force reboot or anything? No, that's what I was hoping for. I thought maybe if I can disconnect the battery somehow. How long did you hold it down? On my way. For about three seconds. Oh, yeah, you've got to go like 30 seconds. Oh, really? Yeah. All right, I'll give that a try then.", "start": 531.79, "end": 558.7, "words": [] }, { "id": 20, "text": " Yeah, try that out. Yeah, the other option is just let it die. Yeah, because you can't remove the battery. You have to disassemble on those Galaxy tabs. You have to take the digitizer and the LCD out to get to the battery. Oh, really? Yeah, so you're just either letting it die or you're holding the button down for around 20 seconds or so. And when it dies, what should I do then? Just try to boot it up again? Yeah. See what happens? I would say just hold the button down. I'm willing to bet that'll work.", "start": 558.7, "end": 584.34, "words": [] }, { "id": 21, "text": " All right. Thank you. No problem. You hold it down until it turns off. Do you know what's kind of funny? That he calls about one of those Galaxy tabs. Because I'm going to be doing a screen replacement for a family member on one of those tabs. And so I forgot to use the heat gun to take the screen off. Oh, broke it. Yes. Very, very violently shattered the screen. And then Howard came into my office and was like, you forgot to use the heat gun, didn't you? And I was like, yes, I did.", "start": 584.37, "end": 608.96, "words": [] }, { "id": 22, "text": " So now you're buying them a new screen. Well, the LCD comes with a new digitizer anyway, so I was all right. It's much harder. But it was at that moment as a piece of glass was flying at me that I was like, I should wear safety glasses. Oh, man. Does that count as workman's comp if it's a personal project? Nope. So just so you know.", "start": 608.96, "end": 631.33, "words": [] }, { "id": 23, "text": " The first hour of the Computer Guru Show is brought to you by Perfection Auto Works. And you should visit their new website. That's perfectionautoworks.com. Mike just called a minute ago. He's a cool dude. He's a pretty cool dude. And the next segments of the Computer Guru Show are going to be brought to you by Reynolds Wrap because of all of the tinfoil hats we're going to have to put on. But in the meantime, Perfection Auto Works, they can do a 26-point inspection on your car. It's totally free. I need to have them go do an inspection on my new car, actually.", "start": 631.33, "end": 660.37, "words": [] }, { "id": 24, "text": " Yeah, so make sure it's up to scruff. Rob just got himself a vehicle, finally. Oh, I had one. It just wasn't as good. One that works. Yeah. One that is right for you. And I've got to make sure that it's perfect, so I've got to take it to perfection. Yep, perfection ought to work. So give yourself the gift of perfection by going down there and seeing them. They are longtime supporters of the show.", "start": 660.37, "end": 683.22, "words": [] }, { "id": 25, "text": " Show them some love by giving them some of your hard-earned money because that's the way business works. I mean, they support the show. They give us money to keep the show on the air. You should give them money. So that they can keep supporting us. Yeah, so they can keep doing that because we all want to stay in business. Right, Mike? Right. So, yeah, give them a call and visit the website, perfectionoutworks.com. And we'll be right back after this.", "start": 683.22, "end": 707.22, "words": [] }, { "id": 26, "text": " I got a king-size bed. I don't know any kings, but if one came over, I guess he'd be comfortable. Oh, you're a king, you say. Well, you won't believe what I have in store for you. It's to your exact specifications. When I was a boy, I laid in my twin-size bed and wondered where my brother was. Your computer guru, Mike Swanson, is here to help you tame that beast of a machine. Join the chat right now at gurushow.com or call in. This is the Computer Guru Show on KVOY, The Voice.", "start": 708.43, "end": 746.26, "words": [] }, { "id": 27, "text": " Your technology guru, Mike Swanson, is answering all your questions one by one. Yes, science! So chime in with yours. The website is gurushow.com. Tune in, click in, and kick back. This is the Computer Guru Show. Welcome back to the Computer Guru Show. My name is Mike, here to deal with your technology needs and treat you like a person in the process. Give us a call, 520-790, if you'd like to be part of the show. Or you can join us in the chat, gurushow.com slash chat. Or you can get your questions answered and...", "start": 750.32, "end": 780.94, "words": [] }, { "id": 28, "text": " Especially if they don't make it into the show, you'll at least get an answer there. Yeah, and we also really do like to hear your feedback, so you can come in there and talk to us and give us feedback and criticism as we're doing it. Yeah, please criticize me. And let's talk to Tom. Hey, Tom, how are you doing? Good morning. How are you today? I'm doing okay. What can I do for you? Well, I've got a perplexing problem that I've just gone through two days with.", "start": 780.94, "end": 810.88, "words": [] }, { "id": 29, "text": " Virtually, my Asus 502L or Q502L, it's not giving me the Wi-Fi speeds that's coming out of my modem. I've connected directly to the modem. I've got Comcast, and I'm getting 105 megs plus. I've checked the speed coming out of the Wi-Fi with my wife's MacBook with my...", "start": 810.88, "end": 840.56, "words": [] }, { "id": 30, "text": " Samsung S6 Edge, and I'm getting the same speeds. With my Asus, it's like 25, 20. Yesterday, it was down below 1 megabytes. Down below 1, you can't explain away. But the 25 to 30 is just the frequency that it's running on. So your MacBook, what kind of router is this? It's a Netgear. Which one?", "start": 840.56, "end": 868.3, "words": [] }, { "id": 31, "text": " Is it a Nighthawk series? Is it one of those big, fancy ones? Yeah. How much did it cost? It was like maybe $100, $70, $80, something like that. Crap, I was just working with that. I wish I had the \u2013 oh, here it is. All right. How old is that laptop or the Asus? The laptop is two years old. So it sounds to me like it's just connecting on a different band, on one of the slower bands.", "start": 868.53, "end": 900.27, "words": [] }, { "id": 32, "text": " Okay. So do you have, like, the 5 gigahertz band and the other bands all with the same name, or are they different? I have the 5, and I have the 2.4 gigahertz. Are they the same name, or do you have them as a different name? Well, I had to reset the router, so everything is the same name, but they're identified in the Genie as 5 gig and 2.4.", "start": 900.34, "end": 926.24, "words": [] }, { "id": 33, "text": " And, by the way, the model of the router is an R6400. Okay. So I would give them different names so that the 5 gigahertz has a separate name. That way you can connect to that one. Because the 2.4 gigahertz band, there's just not enough bandwidth to push that kind of throughput. So you need to be connecting on the 5 gigahertz band. And if they're both the same name, then the devices themselves are going to choose which one they want.", "start": 926.24, "end": 956.32, "words": [] }, { "id": 34, "text": " I have identified them on the Genie. Well, they come up as a 5 gigahertz, Netgear 61 5 gig, and then the other one is just Netgear 61. My laptop is taking the signal from the 5G. Okay, and is there a difference in proximity to the router or anything like that? I'm basically maybe 50 feet further away from it.", "start": 956.32, "end": 986.5, "words": [] }, { "id": 35, "text": " I'm in my office. Okay. If you were to take that laptop and move it somewhere else, do you get different speeds? No. Okay. So if you were to go get 50 feet closer, like where your other devices are, would that still have a different speed going on, or have you tested that? I tested it briefly when I was on with tech support for Netgear, and it gave me the same speeds coming out of my modem. Then I came back in, put it in the office.", "start": 986.5, "end": 1016.99, "words": [] }, { "id": 36, "text": " Went in and changed the name after the reset and everything and tested the speed again. Boom, back down to 25, 24. Yeah, it sounds like a geography problem. So either there's something in the way or you're getting like a reflection, something where that thing is located relative to the router is what it sounds like to me. Okay, so if I were to take my laptop and set it right next to the router and I...", "start": 1016.99, "end": 1045.86, "words": [] }, { "id": 37, "text": " They'll get a slow speed. You don't want to be right next to it. I would say, you know, anytime that you're within, like, you know, 20 or 30 feet of those things, you're going to get some really crazy results. But if you're in sort of that sweet spot that's further away, it should be, it should work. But there could be something going on with the device itself, right, where that device is not picking up everything. Maybe one of its antennas are unplugged because there's three antennas on any of the 5G.", "start": 1045.86, "end": 1075.33, "words": [] }, { "id": 38, "text": " So there's three Wi-Fi antennas that are internal to that machine. And if any one of them gets unplugged, you're going to see kind of crazy results as far as strength is concerned. Or it could be that the card burned out one of the channels. So it just happens sometimes. You can test this theory to see if it's the machine itself. It could be software-based. There's a lot going on there I want you to unpack whenever you're dealing with Wi-Fi issues.", "start": 1075.33, "end": 1103.22, "words": [] }, { "id": 39, "text": " Right, right. Well, I got Netgear to send me a swap out, so I'm going to get a brand new one and send them back this existing one. But in the meantime, I was testing the signal with the MacBook, with my Samsung Edge, and I was getting screaming results. And I'm starting to think if there's something wrong with the receiving aspect of my Asus. Well, that's where I'm going to go ahead.", "start": 1103.22, "end": 1131.79, "words": [] }, { "id": 40, "text": " I'm going to err on that side because if your other devices are working fine, then it's not the router. It's going to be something going on with your machine or its physical proximity. Generally, it's proximity. It has something to go on. You can get reflections from your Wi-Fi signal bouncing off of walls and causing all kinds of problems, or sometimes you have a neighbor that's...", "start": 1131.79, "end": 1156.99, "words": [] }, { "id": 41, "text": " on the same frequency as you that's causing problems for that one specific area of the home. Wi-Fi is way more complicated than people give you credit for. I'm starting to learn that. And Wi-Fi is remarkably unreliable and terrible. Just run a wire over there and be done with it. Well, you know, ultimately, if you still can't figure it out after getting the swap out, we can always come out and check it for you. Okay. All right. Well, it's a laptop. I can bring it to you, too. Well, that doesn't help us because it's all about the Wi-Fi in your home.", "start": 1156.99, "end": 1186.35, "words": [] }, { "id": 42, "text": " Oh, good point. Wi-Fi consultations are free, by the way. Are they really? Yes, they are. So if you want to schedule it up, you give us a call down at the office and we'll get you on the schedule. I certainly will. Thank you very much for your time. Thank you for the call. Yeah, it's Wi-Fi. You know, I remember a few years ago when I was having a similar issue, and I was losing my mind over not being able to get signal in just one place in my room.", "start": 1186.35, "end": 1214.5, "words": [] }, { "id": 43, "text": " And it happened to be the place where my bed was, so it was really aggravating. And I explained everything to you, and eventually we figured out that it was a wet wall. There was a bathroom in between my room and the router, and that was causing the entire issue. Yeah, there's lots of things. I mean, building materials play a huge role in how Wi-Fi is going to behave. Yeah, I ended up moving the router like 15 feet to the left so it could get around that wall. It worked fine. Yep, that's how it works.", "start": 1214.5, "end": 1242.43, "words": [] }, { "id": 44, "text": " The truth is that as much as possible, I try to have people not on Wi-Fi. Yeah, I mean, if you're on your phone, there's really no way to avoid it. But even my laptop, there's a place where I have a line connection running to it in my house. Because Wi-Fi is terrible, and you should probably stay away from it. I do like that they're going with multiple access point mesh networks nowadays.", "start": 1242.43, "end": 1262.64, "words": [] }, { "id": 45, "text": " Yeah, and that's the other thing that we set up for people is if they have these larger homes or they have sort of oddly shaped homes, then we start putting in like mesh networks. Yeah, if you've got a weird shaped house and the Wi-Fi has to go through multiple exterior walls, you're going to have a bad time. Oh, yeah, a very bad time. All right, let's go ahead and take a break. And when we come back, more of the Computer Guru Show. And you can give us a call, 790-2040. We'll be right back.", "start": 1262.64, "end": 1295.6, "words": [] }, { "id": 46, "text": " Whether you're dealing with hardware installation or, heaven forbid, a virus, Mike Swanson is answering all your questions one by one. So call in or chat in with yours. The website? Gurushow.com. Tune in, click in, and kick back. This is the Computer Guru Show on AM 1030, KVOY, The Voice. Mike Swanson, your computer guru, is just a click away. Listen and watch at gurushow.com.", "start": 1317.14, "end": 1347.92, "words": [] }, { "id": 47, "text": " This is a Computer Guru Show on KVOI, The Voice. Welcome back to the Computer Guru Show, 790-2040. If you'd like to be part of the show, let's talk to Elaine. Hello, Elaine. How are you? Hello, Mike Swanson. Hello. Elaine Troy. I have a problem, hon. My honey passed away in 2014, and he's got a beautiful computer. And my friends and I, and even the people he worked with at work, we all tried to put in a password, and we can't get past the password. Okay.", "start": 1347.92, "end": 1376.75, "words": [] }, { "id": 48, "text": " And I don't know what to do, Mike. And I know you've said this a hundred times of how to do it. I didn't mark it down. I've forgotten. I apologize. Well, what I said is if you need this to remove a password, you have to bring it down. Okay. I can't bring it down because I don't have a car and I'm old. And this thing's heavy. You know, it's... We can do an on-site. You can call. You can schedule and we can come to you and do it. I know, but you're so expensive. Well, I mean, there's a trade-off here. Walk me through it.", "start": 1376.88, "end": 1404.85, "words": [] }, { "id": 49, "text": " No, because it's special tools to do it. I'm sorry. Oh, you do? Yeah. So we have to use special pieces of software to make that happen. There is, really? Yeah. So you can't just, no wonder. Man, we tried everything under the sun. I don't know what this man put in there. Well, you haven't tried having me come out and do it yet. I know. Maybe if I could volunteer or something and get a discount. Well, we could probably work something out.", "start": 1405.14, "end": 1430.54, "words": [] }, { "id": 50, "text": " Really? Yeah. Because I do calligraphy, I do ironing, and I can do all kinds of things. I don't think I'd need you to do any of that stuff. But what you could do is, I don't know, you could probably refer some people my way. No problem there. All right, then. So call up the office. I live on Speedway and Craycroft, so I live in a good neighborhood, and whenever we need help like that, we'll come to you. Okay, Mike, I'll give you a call Monday, then. You do that. Hey, thank you so much. I appreciate your show. I'm glad you're feeling better, hon. Okay, thanks. Okay, fantastic.", "start": 1430.54, "end": 1459.54, "words": [] }, { "id": 51, "text": " Take care. Bye-bye. Was I unwell? I don't know. Maybe it's just like one of those things, you know. I don't know if you were feeling bad, but I'm glad you're feeling better now. Yeah, maybe. Maybe you could get a tattoo. What? Get a calligraphy tattoo. Maybe she does tattoo, too. No, no, no. I am very staunchly anti-tattoo. Just looking for the barter thing, man. I could get a free tattoo. I wouldn't mind that. Moving right along. 790-2040 if you'd like to be part of the show.", "start": 1459.54, "end": 1489.01, "words": [] }, { "id": 52, "text": " Yeah, call the shop. We'll remove your password. That and, you know, make sure that after we do a great job, you go on Yelp and let everybody know. Or Google Reviews, you know, that kind of stuff. Yeah. It kind of feels unfair, though. It's like, here's an extremely discounted password removal. How about you just leave me nice things? Well, okay, I should say, leave us some feedback about your experience, regardless of whether you leave positive or negative feedback. Feedback itself is valuable just for the sake of feedback. It is.", "start": 1489.1, "end": 1518.48, "words": [] }, { "id": 53, "text": " That's another rant altogether. You know, I mean, I will say that we really do read all of those. And when people, when we respond, it really is, it's not even me. In most cases, it actually is Mike. We'll take the time to go and sit down and respond to it. Yeah. There's been times where I was like, hey, Mike, I can respond to this for you. And he's like, nah, I got it. I got this, man. You know what's funny about reviews, though, is that there's all kinds of things to unpack there, right? It's most of the time when people do reviews, they only do so when they are.", "start": 1518.83, "end": 1547.3, "words": [] }, { "id": 54, "text": " emotionally engaged to do so. And generally, it's when people are unhappy. It's almost always when they're unhappy. And then secondly, I would say that probably half of the negative reviews that I've received over the years are because they just didn't know where they took their computer, right? I've got some sort of permanent Yelp mark on my account because they took their computer somewhere else and then left the review on me. Yeah, and they're insisting that it's us, and it's like we've never had a tech by that name ever.", "start": 1547.3, "end": 1577.3, "words": [] }, { "id": 55, "text": " Right. Employed, ever. And where it really illustrates itself is that on a couple of them, you know, I've contacted people and I said, come down and see me. We'll make this right. And they show up and they're like, I've never been here before. And I'm like, well, why do you have a bad review on me? And then they never take it away. I'm like, come on. You know, though, I will say that in the, so.", "start": 1577.3, "end": 1597.82, "words": [] }, { "id": 56, "text": " Of all of the reviews, maybe 1% end up being just shining positive examples of a good, happy customer because people are angry when they leave reviews typically. When you get a review and it calls you out by name and says you did a good job, it feels good. It does. It's a nice little boost to your day. Yeah, I try to leave positive reviews just because I know how rare those are. Yeah, and I do the same ever since I started working in this industry. If I have a really good experience, I'll take the time right then on my phone. Yep.", "start": 1597.82, "end": 1626.9, "words": [] }, { "id": 57, "text": " And, you know, I've toyed with the ideas of, you know, let's engage people more often. Let's be like, because there's a lot of places that will be like, we'll give you a discount right now if you leave us a review, right? And to me, it feels really, I don't know, it's like bribery.", "start": 1626.93, "end": 1641.78, "words": [] }, { "id": 58, "text": " It's like, I don't want to bribe you into leaving me a review, but I also understand the other side of that, where it's just like you're unmotivated otherwise to do so. Yeah, it's really hard to convince people, especially once they leave your establishment and they're going home and going about their day. Right, they have a life outside of... And especially if you don't often leave reviews, you get to Yelp and you're like, all right, I'm going to leave a review, but then you can't log into your account because it's been two years and you have to reset the password. It's not worth it. By the end, you're just like, meh.", "start": 1641.78, "end": 1669.76, "words": [] }, { "id": 59, "text": " They know. Yeah. I told them I was happy. Right. And that's the thing with all types of reviews, whether they be just not even the ones you leave online, just the ones that you say to someone else. Right. Your impression of your experience is that they say that, you know, if you tell one person that you're happy, then one person knows that you had a good experience. And if you tell one person that you were unhappy, then 23 people know that you're unhappy. Right. And that's.", "start": 1669.76, "end": 1699.54, "words": [] }, { "id": 60, "text": " the normal sort of human nature of things is that you're going to, you're going to try to watch out for those that you know, and you're going to be like, Oh, you know what I heard? And then it becomes the telephone game. All right. And it's like, I heard that Mike Swanson, you know, not only didn't delete my password, but put a much longer and more complicated password on and then laughed at me. And it was like the guy that, that, that left a review. And he said that, um, that I was condescending and, uh, that I, I, I was very mean to him in person.", "start": 1699.54, "end": 1728.96, "words": [] }, { "id": 61, "text": " And which anybody who has ever dealt with me at all in any capacity when it comes to computer gurus, that's not happening. That's not what I do. Unless you're an employee of Computer Guru. Right. It's in the contract. You're subject to ridicule. It's in there. But, you know, so I left a response to that review. And it's just like, I'm very sorry that you feel that way. And, you know, I'm more than willing to make it up to you. Come on down here. And by the way, this is another one where we couldn't find.", "start": 1728.96, "end": 1756.66, "words": [] }, { "id": 62, "text": " Any corroborating details, like this person has never dealt with me. But we also have to play this game down at the shop, which is let's find out who knows Mike this week. Because everybody who calls up is just like, oh, yeah, I know Mike. Yeah, I've had people call and be like, yeah, me and Mike are friends. We go way back. And they're bragging that they know you to me who has worked for you for nearly a decade. I'm just like, that's cool. And then I'll mention, they'll be like, oh, your friend called. And you're like, who?", "start": 1756.66, "end": 1785.95, "words": [] }, { "id": 63, "text": " I don't know that person. Sounds like a perfect T-shirt opportunity. I know Mike. Yeah, so my dad says that I should raise the prices by 20% and then give a 10% discount to everyone that says that they know me. That's a good idea. That's a good idea. Anyway, yeah, I mean, I'm totally happy to help people out. I'll do Elaine as the freebie of the week. Well, I mean, we've said before, but it really is true.", "start": 1785.95, "end": 1815.71, "words": [] }, { "id": 64, "text": " computer guru members the reason we work there is because we like to help people you know if i could do this if i wasn't getting paid and i was just independently wealthy right i would still be doing this that's good now i'm glad i'm glad to hear that can you can you win the lottery and then i don't have to pay that would be nice that'd be nice you know i never get excited about the lottery because that would be dumb but when it was at 1.5 billion i went and bought some tickets i'm not gonna lie you know yeah every time that i uh like twice a year i'll go out and buy a lottery ticket", "start": 1815.71, "end": 1842.29, "words": [] }, { "id": 65, "text": " And then I'm reminded, I suck at that game. You know, they say I'm statistically less likely to win the lottery than most people. Why? Because my mom won it at one point. Oh, really? She won, like, $10,000. Huh. So lightning doesn't strike twice in the same place. Not the same family line, apparently. They say that there's some correlation there, I guess. I don't know. I think that sounds like bad statistics to me. Okay. So let's do another, like, the government doing things that...", "start": 1842.29, "end": 1869.49, "words": [] }, { "id": 66, "text": " doesn't make computer guru angry are there any of those these days there is so there's a dig once bill that's that's uh you'll have to tell me about this because i didn't read that story all right so since 2009 there has been a legislator that has been trying to get this bill called the dig once bill passed which would require that any road work that's being done or sidewalk work or any any type of", "start": 1869.49, "end": 1897.18, "words": [] }, { "id": 67, "text": " the road and surrounding areas work, that has any type of federal funding involved with it at all, which is almost all of them, that they would be required to incorporate conduit for fiber runs. That's a really good idea. And there's been some pushback by, of course. Oh, yeah. They don't want to have to do more work.", "start": 1897.18, "end": 1918.77, "words": [] }, { "id": 68, "text": " Well, not by them, right? Because they're getting paid to put the condo in regardless, right? But the telecom companies have been pushing back and saying, well, I don't know about this, right? That sounds like we'd have to offer better services for more competitive rates. Well, it sounds like it would make it easier for the little guys to be able to compete with us. And that has been some of the pushback. But some bigger names have gotten involved and said.", "start": 1918.77, "end": 1943.63, "words": [] }, { "id": 69, "text": " We're okay with this, such as CenturyLink and Verizon, which is weird to mention them in a positive light. Yeah, no kidding. But both of which have said, yeah, I think this is a good idea. It could lower the cost of delivering or upgrading broadband services by 90%. I always forget that Verizon's like an actual ISP in a lot of places. Yeah, yeah. It's interesting as an example. So at the Fort Lowell office.", "start": 1943.63, "end": 1973.15, "words": [] }, { "id": 70, "text": " We have this smoking fast, really kind of like I pay way too much for internet. Yeah, we do. But it's required for what I do. It's the only ones I can get. I can't do those kinds of torrents at home. I mean, I would never do such a thing. Stop it. So one of the days the internet was down, and they had all the cocks trucks out, and I went over and talked to them. I'm like, first of all, I was like, hey, when are you going to be done with this?", "start": 1973.15, "end": 2003.18, "words": [] }, { "id": 71, "text": " There's a Verizon cell phone tower like 500 feet away from where they are working. And I'm like, oh, I imagine the Internet's down for the Verizon cell network. And he's like, oh, no, no, no. We get our Internet from them. It's going the other way around. And I was like, well, that's interesting. That is interesting. So, yeah, Cox has its own thing going on, but apparently there's several areas where they just jump off of a cell phone tower.", "start": 2003.18, "end": 2030.42, "words": [] }, { "id": 72, "text": " Well, someone that I know worked for one of the call centers, of which we have many here in Tucson. Right. And she basically only did Verizon Fios support. Right. Yeah, from here. So that's how I learned about all that. Yeah, so Verizon, for much of the East Coast, is a real ISP. I don't know. That seems more scary than, like, Cox or Comcast to me. Well, they probably have something along the lines of, like, you know, Central Excel phone over there.", "start": 2030.42, "end": 2059.89, "words": [] }, { "id": 73, "text": " It's like next year, Comcast and Verizon merge. They rename their company to just Evil. It's just called Evil. Evil Corp. The whole idea of this whole Dig Once bill, I think, is something that we should probably actually have a conversation with our senators and our representatives and say, hey.", "start": 2059.95, "end": 2079.66, "words": [] }, { "id": 74, "text": " Let's make this happen because really it's going to be better for us all in the end. And it's something that the Democrats and Republicans seem to agree on right now. I know. It's like this is a gimme, you guys. You want to show that you can reach across the aisle. This is the one. It's easy. Here's an easy one, right. Here's an easy one. It's a softball for everybody. Just do it. But if you notice how much money was given to senators regarding the whole let's go ahead and sell your private information.", "start": 2079.66, "end": 2107.15, "words": [] }, { "id": 75, "text": " because that came out this last week as a list of how much money was given. I don't even know which one I'm more angry about, that or the one we're going to talk about later. I mean, that really, really got to me. We'll put the link in the show notes for that, too. We're going to take a break. When we come back, more of the Computer Guru Show, 79024. Computer troubles? Need some advice? Call in now. Mike Swanson will be back after these messages. The Computer Guru Show, AM 1030, KBY, The Voice.", "start": 2107.15, "end": 2153.65, "words": [] }, { "id": 76, "text": " Mike Swanson, your computer guru, is just a click away. Listen and watch at gurushow.com. This is the Computer Guru Show. Welcome back to the Computer Guru Show. Let's talk about IBM for a minute. Did you know they're still around? Well, you know, I was just asking. Like, they're still around, right? But it's just their computer division that's Lenovo now. Right. The Consumer Electronics Division sold off.", "start": 2164.08, "end": 2185.79, "words": [] }, { "id": 77, "text": " They still do a lot of things in medical and then mostly in supercomputing and storage. Yeah. Back in the day, my mom used to work for a company that built IBM supercomputers. Yeah. Well, like IBM or just IBM? It was called Thor Electronics. Ah. So, yeah, there's all kinds of stuff that IBM is still doing. They do a lot of medical stuff. They do mostly storage as far as gigantic storage devices for banks and other federal entities.", "start": 2185.79, "end": 2214.82, "words": [] }, { "id": 78, "text": " And they also are doing a lot of machine learning AI stuff. And one of the things that they've recently patented is a backup system or a co-pilot for autonomous vehicles. So they're saying, they're seeing that, you know, in the future, there's going to be mostly self-driving cars around. And what they wanted to do was build something that...", "start": 2214.82, "end": 2237.07, "words": [] }, { "id": 79, "text": " accounts for system failures or glitches on the primary side. So it's like a sub-computer specifically to handle failures of the main system. Right. So as an example, if you end up with a brake failure or something along those lines, or lights not functioning properly, that this particular AI will then help to mitigate the disaster that is impending. It's probably a good idea. Yeah, because all computer systems have glitches.", "start": 2237.07, "end": 2266.94, "words": [] }, { "id": 80, "text": " I mean, you know, eventually if we follow this line of thought, though, there's just going to be infinite AIs in your car. Now we need a backup for the backup. Yeah. Now, if you were to look at this from the perspective of, yes, computers have glitches.", "start": 2266.94, "end": 2281.66, "words": [] }, { "id": 81, "text": " and you need a backup system to help with that. I mean, airplanes do this. It has been for years. Yeah, I really think that a lot of the autonomous vehicle industry is going to be modeled after the airplane, the airline industry. Yeah, I can agree with that. But they're saying that they've come up with this idea just mainly to deal with glitches and other types of failures within the system.", "start": 2281.66, "end": 2302.02, "words": [] }, { "id": 82, "text": " But as you'll find out in the next segment of the show, there could be other areas where this would be useful, as in if your vehicle gets hacked. Some intentional failures? Yeah, it could be a failure that maybe would be hard to find, forensically speaking.", "start": 2302.02, "end": 2322.85, "words": [] }, { "id": 83, "text": " Brand new car crashing into a tree at high speed. These types of things. So maybe this type of system would help to prevent those types of things. Or, if you're more like me, the technological cynic, which would be, or it's just another point of weakness that you can exploit, that will be exploited, and maybe someone will hack the backup system that will take over the car. Or worse yet, what if the two systems come into an argument state?", "start": 2322.85, "end": 2352.59, "words": [] }, { "id": 84, "text": " You know, the main thing that bothers me about autonomous vehicles, and I won't lie, there are some things that bother me, even though I tend to be an optimist when it comes to at least this industry because I really want it to happen, is that computer systems nowadays, if I really feel like there's something wrong with my computer, I can take it apart and work on it and repair it if necessary. Your cars are being built to not let you do that.", "start": 2352.59, "end": 2375.02, "words": [] }, { "id": 85, "text": " For several years now, the whole right to fix thing. Yeah. I'm a strong believer in the right to repair. However, when it comes to cars, there's not even an argument there. They're just not letting you. Right. Like the BMW i8, as an example, you can't even open the hood. I mean, you need another person to do it. Right. You are not capable of opening the hood because it takes two latches that are too far apart from each other. It's like turning nuclear key switches. Right.", "start": 2375.02, "end": 2404.37, "words": [] }, { "id": 86, "text": " All right, let's take this call here. Let's talk to Jeff. Hey, Jeff, how are you? Yeah, and I think that there's an option here where I think you are going to see a resurgence of open source just based on like the next hour of the show. That's so weird to me, the concept of flashing new firmware to your car. So I think that we're going to see people that are building replacements for vehicles where you can say.", "start": 2404.5, "end": 2443.87, "words": [] }, { "id": 87, "text": " Do you not want that closed system that has these built-in back doors? Well, here's an open-source flash for your car. We'll reprogram the car, and you can do whatever you want to it. Wrong rev number. I bricked my car. Don't brick the car. So what can we do for you, Jeff? Okay. Two questions for you. Outlook, it gets a lot of spam. Right. Is there any downside to that? I mean, it depends. Is your computer a potato, or is it a decent computer? It would have to be a lot of rules.", "start": 2443.87, "end": 2503.02, "words": [] }, { "id": 88, "text": " Yeah, you would have to, I mean, one of the things you can do is sort of combine rules. As an example, I have a rule that is a, it's like a bad word rule, right? And we're not talking like naughty language or anything, but there are specific words and characters that are used very often in spam messages. And so that single rule, I just keep adding different qualifiers for. It's like if it's this word or this word or this word, and I just keep adding that one. It's still one rule.", "start": 2503.02, "end": 2533.01, "words": [] }, { "id": 89, "text": " So you can take rules and combine them when it really comes down to it. Yeah, you may just have to go in there every now and then and kind of combine all your rules. But, yeah, as long as you've got a decent computer, you can put pretty much as many rules as you want in there. I doubt that I would go over, you know, 1,000 or so. And if you need that many rules, you've got something else going on. And as far as we need to have a conversation about.", "start": 2533.2, "end": 2563.54, "words": [] }, { "id": 90, "text": " Spam filtering. Yeah, how you were getting on all of these lists in the first place. Right. That was the one time I gave out, divulged my email, and after that. Yeah, and there's some additional spam filtering that can be done, especially if you're willing to move to a private domain, like a domain that you own. Then you have a lot more options as far as what you can do for spam filtering. And you can teach the Google spam filter a lot if you go into the...", "start": 2563.63, "end": 2599.97, "words": [] }, { "id": 91, "text": " the actual Gmail site and start flagging messages there, then it gives you some extra functionality as far as spam filtering is concerned. Lastly, talk about antivirus that do. We'll have to cover that in the next hour here just because we're out of time, but basically you don't really need it. Thanks for listening to the first hour of the Computer Guru Show. My name's Mike, and we'll be right back after these messages.", "start": 2599.97, "end": 2645.81, "words": [] }, { "id": 92, "text": " If you love to read but often find you don't have the time to do so, check out Audible. They have more than 180,000 audiobooks in their library, and you can listen to them on your phone, tablet, or computer. Learn more and get a free book with your 30-day trial by going to audibletrial.com slash gurushow. We love doing this show. It's pretty expensive, though, so we could use your help. For as little as a dollar a month, you can help us keep the lights on, as well as contribute to our fun side projects.", "start": 2654.99, "end": 2680.8, "words": [] }, { "id": 93, "text": " You'll be funding everything from tech tutorial videos that we'll be putting on our YouTube channel to crazy stuff like melting Furbies with thermite. We're not joking, we actually did that, and our Patreon supporters made it happen. With your contribution, you'll not only get access to that content and more, but you'll help us create more in the future. We even have rewards set up depending on your contribution level, where you can do things like advertise your business with us, or even be a guest on the show to talk about whatever you want. If you'd like to get started, go to gurushow.com and click the Patreon logo.", "start": 2680.8, "end": 2713.33, "words": [] }, { "id": 94, "text": " Computer running slow? Avoiding. Caught a virus? Does your computer seem to have a life of its own? Malfunction. Need input. The computer guru is here. Call in now. Now, it's Mike Swanson, your computer guru. Hello, my name is Mike, here to deal with your technology needs and treat you like a person in the process. This is the Computer Guru Show, and you can reach us at 520-790-2040.", "start": 2713.33, "end": 2740.77, "words": [] }, { "id": 95, "text": " 520-790-2040 if you'd like to be part of the show. This is the second spicier hour of the Computer Guru show. Slightly spicier hour. We're going to start with a little bit of follow-up. We're going to first answer Jeff's question from the last hour, which is talking about firewalls and how useful they are or how I view them as are not. There is something to be said for hardware firewalls.", "start": 2740.77, "end": 2766.53, "words": [] }, { "id": 96, "text": " We'll just go ahead and throw that out of the way at first, which is nice, decent firewall hardware that you install at your location. And those are becoming more and more useful in the home. Yeah, and they definitely are. Where you can control different types of traffic, and it's a separated system from the rest of your computer setup. And that way, if your machine gets an infection, it can't go in and modify firewall rules without your being...", "start": 2766.53, "end": 2796.19, "words": [] }, { "id": 97, "text": " notified of it uh so hardware firewalls i think are useful i think that software firewalls that are built into your operating system are nearly useless it's like a nice thought you know right it's it's it's one of those things it's it's kind of makes you feel better but it's like most antivirus right the ones that have all the flashy lights and say we protect you from everything and they really don't they just make you feel safer", "start": 2796.19, "end": 2823.97, "words": [] }, { "id": 98, "text": " much like the Mac operating system in general, which makes you feel safe but really doesn't have any additional safety benefits other than it's not really all that popular. So that's the only safety that you have. That's so sad. There's not enough of you to make you useful on a monetary level. So, yeah, that's about it. Firewalls.", "start": 2823.97, "end": 2851.98, "words": [] }, { "id": 99, "text": " First of all, easily evaded and don't do a whole lot for you. Inbound, yes, it can help you to a certain degree of script kitties or people that don't know what they're doing. Yeah, it filters out the script kitties. Right. It's much along the same lines as locking your home, really. That's the firewall to your house. Keeps the honest people out. Right. Keeps honest people out. If they want in, they're getting in, and that's doing nothing to stop them.", "start": 2852.11, "end": 2880.53, "words": [] }, { "id": 100, "text": " So it might make a little noise, but that's about it. So, yeah, the firewall thing is not super useful. I find that antiviruses that want to manage your firewall rules tend to be more of a pain in the butt than they're worth. So just, you know, the defaults are fine. If you really want that added layer of security from your built-in firewall, set your machine to public.", "start": 2880.53, "end": 2908.37, "words": [] }, { "id": 101, "text": " so it shuts down all of the unused or dangerous ports for the most part, but it's an almost fictional level of security. Yeah, and if you're doing anything related to home automation, you're going to need a hardware firewall, and we're going to be talking more about that soon. Yep, that's on the list of things to do. I will say that it has been an ongoing project for me at Computer Guru to bypass our hardware firewall, and so far I've had virtually no luck. Which is great. It's a difficult one to crack.", "start": 2908.37, "end": 2937.25, "words": [] }, { "id": 102, "text": " Even inside the network. All of the attacks that I've been able to do are like, I turned the firewall off and I bypassed the network by signing into it. Yeah, nice. So the hardware firewalls play if they're set up properly. Yeah, I've actually been thinking about having, you know, we've been talking about doing some kind of an event at the shop.", "start": 2937.25, "end": 2959.33, "words": [] }, { "id": 103, "text": " I think part of that, we'll set up a dummy home network. And we have a couple other hardware firewalls there. And I want to show this is what happens when it's plugged in. This is what happens when it's not plugged in. The difference just in having that piece on your network. Yep. And that's even from inside. You know, for all the flack that Windows 10 gets, and especially for me, we're going to do a little bit of talking about why you shouldn't be on Windows 7 as well. Yeah, because... Because you really shouldn't be. There's some dangers. There's just a little bit of danger involved. Let's go ahead and talk to Denise. Hello, Denise. How are you?", "start": 2959.33, "end": 2989.07, "words": [] }, { "id": 104, "text": " Hello. Hello there. How are you? I'm lovely. What can I do for you? Well, I have a Toshiba laptop that I got a big update a couple weeks ago from Microsoft. And since then, my spacebar doesn't work. And, like, my 1 through 5 on the keyboard, not the 10-key portion of it, don't work unless I hold the Fn key in. So on a scale of 1 to 5, how would you rate that update?", "start": 2990.16, "end": 3020.51, "words": [] }, { "id": 105, "text": " All right. So, yeah, there's a piece of software that's involved with controlling function keys and how your keyboard interacts with you. And it sounds to me like that software is broken. Okay. So if you go to the Toshiba website and go to the support site that's specific to your model, there's...", "start": 3020.51, "end": 3046.32, "words": [] }, { "id": 106, "text": " I can almost guarantee without even looking that there's going to be a, here's a really important update you should get for this particular machine in regards to the keyboard. And they're often called hotkey updates. All right. Yeah, because when I go into the settings and I go to the keyboard, it shows that everything's up to date. Yeah, that's pretty much not going to matter because it doesn't know that it's broken.", "start": 3046.32, "end": 3070.99, "words": [] }, { "id": 107, "text": " Oh, okay. So I would go to the Toshiba website and get the right software, the updated software for the hotkey driver for your machine. Wonderful. Which is probably going to solve your problem as it regards to function keys. Now, there's another option that you can do on certain machines, and I don't know if yours is going to support this, but if you can get into the BIOS settings, there is an option for the function key to be defaulted on or defaulted off, and you can try switching that to see if that helps your problem. Okay.", "start": 3071.15, "end": 3101.46, "words": [] }, { "id": 108, "text": " But this does happen on occasion. This is one of the reasons I don't like all of the hot key drivers that manufacturers like to put on laptops these days. They want to use all of the keys for all of the things, and they should stop that. In my opinion, it's dumb because it causes this exact problem. Yeah, because it worked fine until I got a big Windows update, and then it's kind of hard when your space bar doesn't work.", "start": 3101.68, "end": 3129.09, "words": [] }, { "id": 109, "text": " Yeah, and a portion of this is going to be that if you got a large update from Microsoft, that's probably the anniversary update, which is almost a year old, which means you're way behind on updates. And so part of that problem is going to be that there is a time lag here where all of the other software has been updated and you are late to the party. And so your penalty is that for right now your keyboard doesn't work until you go and get those other drivers. Okay.", "start": 3129.09, "end": 3158.75, "words": [] }, { "id": 110, "text": " So you can get around this by just using the mouse, of course, to get your updates, or hook up an external keyboard, which won't have those problems. Okay. Well, great. I was hoping you weren't going to say, oh, you need to go get a new laptop. Well, you don't. That's only if you have a Mac. Well, that's coming up. But, no, you don't need a new machine. You just need to go get the right software to run those special keys. Oh, great. Well, thank you so much.", "start": 3158.75, "end": 3188.86, "words": [] }, { "id": 111, "text": " All right, thanks for the call. I have special keys. You have special keys? This reminded me of that contact lenses commercial. My brand. Press my buttons, please. All right, 7902040 if you'd like to be part of the show. So we only have like a minute and a half. Yeah, we're not going to be able to do it this segment. So should we just tease what's coming up next? Yeah, how do you like your Computer Guru show, spicy or mild?", "start": 3188.86, "end": 3212.91, "words": [] }, { "id": 112, "text": " Yeah, that's what I... It's about to get spicy. It's about to get a little bit spicy. Especially if you have an apple anything. Yeah. Because there's going to be a certain amount of conversation. And you know, this one, I hate when I have to do this. I hate when I have to defend something I don't like. But it's not really their fault that much. It's not at all, actually, their fault. It's... This is one of those things, it's like...", "start": 3212.91, "end": 3237.5, "words": [] }, { "id": 113, "text": " But to kind of preview where we're going here is that over the last couple of weeks, there's been a couple of very large WikiLeaks dumps about the CIA. Like of proportions where you'd be wearing a tinfoil hat if you'd just been some dude telling people this. Right. So a month ago, if you're going, you know what? This is actually happening. I'd have been like, all right, man. You'd be like, you're kind of crazy because that just doesn't happen. And the earth is flat, too, right? Well, I mean, it actually is, though.", "start": 3237.5, "end": 3266.3, "words": [] }, { "id": 114, "text": " Stop it. Yeah, there is some, like, persistent stuff. And if you're in the technology world, when you talk about persistence, like, let's say that, you know what? Let's just go ahead and factory reset to just go ahead and get around this problem. Persistence is the ability for that malware infection to survive a factory reset. So it goes, aw, that was cute. Or let's say, for instance, you're like, you know what I'm going to do?", "start": 3266.3, "end": 3296.32, "words": [] }, { "id": 115, "text": " I'm just going to yank the hard drive out of this thing, put a brand new drive in, and start from scratch. Surely, surely that got it. Nope, nope, that didn't get it either. This is like back in the day when printer infections meant you had to throw your printer away to get rid of it. Yeah, and now even throwing away your device is not going to save you. That's the scary part of this because, oh, yeah, there's some stuff like, as an example, just a quick.", "start": 3296.32, "end": 3322.99, "words": [] }, { "id": 116, "text": " Quick little teaser here. Let's say that your computer gets an infection, and it knows that you're pretty savvy about these things, this infection. So it says, I'm going to go ahead and infect your peripherals. So that way, when you throw away your computer and go get a new one, that we can reinfect the machine while it's booting before anything ever happens. It just has to appear. That is craziness. And their response, you know, the official response to this, oh, it's not a hack. It's a feature.", "start": 3322.99, "end": 3353.07, "words": [] }, { "id": 117, "text": " Oh, yeah. Why did you tell people? You need this. You need it. You need this to be safe. Think about the children, will you? 790-2040 if you'd like to be part of the show. We're going to take a calming break before we go all kinds of spicy on the Computer Guru Show. Be right back.", "start": 3353.07, "end": 3376.5, "words": [] }, { "id": 118, "text": " Your computer guru, Mike Swanson, is here to help you tame that beast of a machine. Join the chat right now at gurushow.com or call in. This is the Computer Guru Show on KVOY, The Voice. Welcome back to the Computer Guru Show.", "start": 3389.71, "end": 3420.35, "words": [] }, { "id": 119, "text": " Spicy Edition 7902040, if you'd like to comment on what we're talking about now. And now's the part where I have to stand up for something I don't like, which I don't like doing. All right. Stand up for it, then. You know, we're going to be talking about all of these massive drops that have happened. Right. And maybe you can introduce this a little bit better than me, but what's going on with Apple? All right. So there are a number of leaks that have happened recently regarding WikiLeaks.", "start": 3420.35, "end": 3449.39, "words": [] }, { "id": 120, "text": " Apparently, some things have come to light about the hacking capabilities of the CIA when it comes to different types of devices. Now, we've known about things like Stuxnet for years now, which is... Which I've begrudgingly admired as one of the greatest examples of infiltration and hacking that has ever occurred. Right, and then it made it into the outside world, which is one of the complaints that we've always had in regards to...", "start": 3449.39, "end": 3474.08, "words": [] }, { "id": 121, "text": " Why do you have these tools and not tell people about the vulnerabilities so that they can be fixed? Because eventually these types of vulnerabilities are going to come to light and people that are not your friend. Right, and I mean ethical hacking is discovering and divulging. You find the exploit and then you tell them about it so they can fix it. As an example, let's say that you had an Apple computer and an exploit or a vulnerability was found that said, you know what?", "start": 3474.08, "end": 3503.3, "words": [] }, { "id": 122, "text": " You can expose this machine to any number of exploits by doing a couple of very simple things. Someone would then, as an ethical hacker, go to Apple and say, listen.", "start": 3503.3, "end": 3516.91, "words": [] }, { "id": 123, "text": " This is the vulnerability I've found. And you have X amount of time to get this resolved before it gets released, gets published, much like medical papers get published. Right. Because a lot of people don't recognize that there is a similarity there or a parallel that happens in the medical world where you can say, I've noticed that this particular side effect happens or this particular type of thing happens when it comes to, you know, like.", "start": 3516.91, "end": 3544.75, "words": [] }, { "id": 124, "text": " or trying to link something between, like, as an example, dietary intake and a certain type of cancer or these types of things where there is a correlation, a weakness is found, a study is done, and then results are published.", "start": 3544.75, "end": 3566.3, "words": [] }, { "id": 125, "text": " tech world, there's a publishing that happens as well when it comes to this is the behavior that I've noticed. This is the steps to reproduce. This is how you can fix it. Here's what I'm going to tell everyone. I'm going to tell everyone about what I've found because these are actual scientific researchers that are doing this type of work in most cases. It's all to protect the end user. You're not doing this as a courtesy for the company. It's a courtesy to tell them, but it's really like you're going to fix this because I'm going to tell everyone.", "start": 3566.3, "end": 3596.1, "words": [] }, { "id": 126, "text": " It is sort of putting the feet to the fire when it comes to developers because overall what they're really looking for is a way to improve the standards for coding, a way to recognize that this is either a vulnerability or a weakness or a strength, and to be able to say this is how you can reproduce this, this is how you can incorporate it into other types of work and other types of projects. And if you don't do this, then everyone's going to know about it.", "start": 3596.1, "end": 3625.26, "words": [] }, { "id": 127, "text": " And, by the way, that's what they mean when they say a zero-day exploit. They're saying you effectively now have zero days to fix this. Right, because it's now known. Right. And so anything that is zero-day means that, so far, it is an unresolved problem. And they were almost certainly told about it a while ago. Yes, yes, they were. So there is a certain amount of exploits that are out there that nobody knew about. CIA knew about them. Turns out they knew about, like, a lot of them.", "start": 3625.26, "end": 3654.64, "words": [] }, { "id": 128, "text": " A whole bunch of them. And one of which allowed persistent hacks on Mac devices, which is terrifying. So they're infiltrating peripherals like we were talking about. So your hard drive doesn't matter at all. It's not what's being attacked. Even the computer doesn't matter. Yeah. Right. So basically the computer gets an infection, picks it up.", "start": 3654.64, "end": 3675.7, "words": [] }, { "id": 129, "text": " And it can be done silently, which is also terrifying. And it says, okay, now I need to embed myself in the environment. We talked about printers on the last segment. There's attack platforms that infiltrate printers and then affect all devices on the network based on that. Any device that talks to the printer. Right. So it also infects USB devices of all types. So you get a flash drive, it puts itself on there. You have a USB-connected printer.", "start": 3675.7, "end": 3702.67, "words": [] }, { "id": 130, "text": " It's on there. You have certain types of backup storage. Your router. Your router, yeah. These types of things are all infected, especially if they're all Mac products, because they all suffer the same weakness. And they basically look at each other, and there's a checks and balance system. So you're like, okay, I'm getting a new computer. Add a new computer to the network. That particular computer checks in with the network and it says, hey.", "start": 3702.67, "end": 3730.72, "words": [] }, { "id": 131, "text": " Hey, I'm a new computer. I'm here on the network. And those devices say, you need this software. And they emulate keyboards or network devices, which are allowed to speak to the computer without any type of security.", "start": 3730.72, "end": 3742.35, "words": [] }, { "id": 132, "text": " Because they're required to use the computer regardless of what's happening. You need a keyboard, and you need network. Yeah, I mean, when it comes to user input, those are called HID attacks, and this is like you mentioned the rubber ducky stuff last week. Right. That's, you know, I'm playing around with that right now, but that's essentially script kitty stuff compared to what the CIA has been doing this whole time. Right, they're doing stuff that we can't even comprehend from general developer standpoints. So they're...", "start": 3742.35, "end": 3767.04, "words": [] }, { "id": 133, "text": " emulating network adapters, and those network adapters say, hey, I need these special permissions in order to get you on the Internet. And the computer says, well, my first priority is to get on the Internet. So, yeah, sure, have whatever you want. What do I need to get that done? Right, and the transaction happens where it says, okay, if you need this to get on the Internet, if you need, because the computer can't start effectively, right, it feels incomplete without the Internet.", "start": 3767.04, "end": 3791.79, "words": [] }, { "id": 134, "text": " If it can't get what it needs, it allows the permissions and allows the network card to elevate permissions to be able to say, okay, you need to install some special drivers because you're a network adapter and I need a network adapter. You can have whatever permissions you like. You can write to any file you like, and you can do this before there's ever any user input or even the possibility for user input to say yes or no to this. And so then it can install its software on the machine.", "start": 3791.79, "end": 3820.54, "words": [] }, { "id": 135, "text": " Also into the BIOS of the machine so that even if you factory reset the machine, as soon as you reinstall the operating system on the BIOS says, Hey, guess what? I have this network card requires these special permissions. Go ahead and give us those permissions. And even flashing your BIOS wouldn't matter considering that it's already infected your USB drive or your, your adapter in this case, because they're, they infect adapters as well. Yep. Like the, you know, on a Mac, the Thunderbolt adapters.", "start": 3820.54, "end": 3845.25, "words": [] }, { "id": 136, "text": " Yeah, so the Thunderbolt to Ethernet adapters. So they pose as those types of things. Anytime you have something between your computer and your Ethernet cable, there's an attack vector there for sure. Right, and that includes even just the keyboard. So anything that you can install, as an example. Let's say that you are using your computer. Macs are, either rightly or wrongly, known for having very good security when it comes to...", "start": 3845.25, "end": 3875.02, "words": [] }, { "id": 137, "text": " User permissions, right? A piece of software cannot install without the user typing a password to confirm that that installation is allowed. And if you have a Mac, you know that this is true, at least to a certain extent, because any piece of software you try to install, you have to confirm with your password. The problem is, though, with an HID attack, you can just simulate the user. Well, not even that. So you've got your Mac as an example.", "start": 3875.02, "end": 3901.73, "words": [] }, { "id": 138, "text": " All right. You're sitting in front of it and you say, you know what? I'm going to hook up this external mouse or I'm going to hook up this external keyboard to the computer, an interface device. It doesn't ask for a password. It doesn't ask for anything. Right. You plug it in. Computers inherently trust human interface devices. Yes, they do. And they trust people. And that's going to have to change. And I think that's really what's going to come down there. It's going to be a much more Bluetooth-esque experience where there's going to be some other protocol and an authentication to say.", "start": 3901.73, "end": 3931.15, "words": [] }, { "id": 139, "text": " Are you sure you want to allow this keyboard to do this stuff? And it's going to be, I think, a lot more Android-like in behavior, where you're going to say, by the way, this device really wants this permission to do these types of things. It's worth noting that at the current state right now, HID is effective on Android as well, and iPhone, pretty much anything you can plug a keyboard into. Right, any computer device at this point. And this is what makes these particular attacks that the CIA is using to be really, really effective.", "start": 3931.15, "end": 3960.75, "words": [] }, { "id": 140, "text": " is that there are no devices that we know of anyway that you can't go and plug in a keyboard and have that keyboard issue commands in the background without you ever knowing about it. That doesn't happen. There may be some instances where there's single user sessions. Certain Unix machines or Linux boxes that are set to single user mode, that it cannot initiate some type of a background process.", "start": 3960.75, "end": 3987.92, "words": [] }, { "id": 141, "text": " That may be an instance, but at the same time, it's not going to ask for permission to spawn those processes. It's just going to say, you're a keyboard, you're allowed to do whatever you want because you're a keyboard. It's just a keyboard, no big deal. When in reality, these HID devices type at the speed of the USB bus, you know, a thousand words a minute.", "start": 3987.92, "end": 4008.86, "words": [] }, { "id": 142, "text": " Or more. Or more, yeah. Or like a thousand words a second. Yeah. Sorry, so they're really moving along. Can issue as many commands as they like, as quickly as they like, as long as the computer can keep up. They call it a USB drive-by because the attack happens in 15 seconds, you know, or less. You don't even know what's happening. You can open a reverse shell on a machine in less than five seconds. So it rubs them playing with one of these devices to try to learn more about them because we had teased about them last year. We even talked to Mike Emery over at Perfection Auto Works about...", "start": 4008.86, "end": 4037.46, "words": [] }, { "id": 143, "text": " the vulnerability of having exposed USB ports on your business network, right? Because anybody could walk up, place a device in the USB, and in many cases, they can break all the passwords. So I tested this on my own machine, and in 30 seconds was able to get all of the host information about the machine. So every update that I've installed.", "start": 4037.46, "end": 4057.39, "words": [] }, { "id": 144, "text": " a full list of all of my programs and all of their updates, a plain text version of my Windows password, my domain password, all of the passwords from Chrome, all of that dumped into a file saved on my flash drive, and I walked away. So yeah, there's some inherent danger to the HID attacks. So any type of attack that emulates a keyboard or a network interface can do really dangerous things to the machine. And then the whole persistence bit when it comes to Apple, and by the way, this affects every Apple product.", "start": 4057.39, "end": 4087.25, "words": [] }, { "id": 145, "text": " Ever. And the persistence is what makes it truly, truly scary, because it's not a drive-by anymore. They parked in your garage, and they're hanging out. Right. They came in while you weren't there. They put up their little cameras and microphones all over your digital infrastructure, and you never know that they're there. Yeah, back in the day, they had to break into your house to install cameras and microphones. Now you bring them home from Walmart yourself. Yeah, you go to the Apple store and bring them home. But it's kind of terrifying, right? And it affects all...", "start": 4087.25, "end": 4116.94, "words": [] }, { "id": 146, "text": " Apple products. I mean, they were even talking about affecting the supply chain before it reached you in the first place. Now, this is when we're talking about the supply chain is when it comes to iOS devices. So if you're looking at the iPhone, iPad, and some versions of the MacBook Air, there is a type of infection that can be implanted on factory fresh machines. So they can install them onto the device.", "start": 4116.94, "end": 4146.14, "words": [] }, { "id": 147, "text": " without ever setting anything up at all, and then you think that you've got this brand new straight from the factory. You're peeling off the plastic, and it's already infected. Yeah. So that was the drop from last week when they were talking about the Apple infections and the vulnerabilities, and the fact that over the last 10 years they've been developing these. And before we've even really had the time to impress this upon everybody, there's a new one. Oh, yeah. Yeah, so.", "start": 4146.14, "end": 4174.74, "words": [] }, { "id": 148, "text": " That will be for the next segment here. Let's go ahead and fit Charlie in real quick. Charlie, how are you doing today? It's good. I'm alive, so that's something. Good afternoon. Network connect. Computer in the back room. It's only showing partial speed, even though my LAN connection shows I have a 100 megabit connection. Right. My wife's computer is on the same network, and hers is showing, well, almost 100 megabits through a web-based speed test.", "start": 4174.74, "end": 4221.84, "words": [] }, { "id": 149, "text": " feed of .me and places like that and i've to my computer still comes up with 15 megabits throughput when i'm i'm expecting at least 40 or 50 okay any suggestions length of the cable they're you know probably like 20 feet 20 feet okay i mean speed and duplex setting comes to mind but those almost never get changed right i hopefully it's not a duplex setting but uh i'm gonna i'm gonna go with straight quality of wire", "start": 4221.84, "end": 4257.62, "words": [] }, { "id": 150, "text": " So, I mean, is it the same type of cable that's being used? Cat5. And mine is right here. That's a nice router. Okay, so if you were to plug into her cable, do you get the same results? I'm going to try that. I just tried a different crossover a little bit ago, and it gave me the same results. First of all, the whole crossover versus straight through means nothing anymore. Okay. Because switches are automatic. They adapt.", "start": 4258.58, "end": 4301.6, "words": [] }, { "id": 151, "text": " for that automatically. Yeah, it used to be a thing, not so much. Yeah, so the only time that a crossover cable is even remotely useful is if there are no switches. Okay. So that's the whole point of it, is that there is no switch, so you must do the crossover to flip those wires so that you can have two computers talk to each other directly with no switches in between. Gotcha. Well, it's got an Intel R2579V type. Tell me more about your computer, though. What speed is your processor? How much RAM do you have?", "start": 4301.6, "end": 4333.84, "words": [] }, { "id": 152, "text": " Probably three gig. Okay. Do you have any kind of crazy software firewalls going on in there? You got like Norton antivirus installed or something? No, no firewalls. I have malware bytes, and I did have a VAST on there. Okay. So first we're going to eliminate hardware, which is you plug it into that same cable that your wife's machine is working and see if you get different results. Okay. And then beyond that, you have to test the other hardware.", "start": 4335.63, "end": 4360.34, "words": [] }, { "id": 153, "text": " What about all the ports on your router? Are they all in good shape? So let's try a different port, see if you get a different thing. Try a different cable on your computer. So we need to eliminate the hardware portion of it first. Yeah, it's 3.4 gigs, and it's all a 3570K processor. Yeah, well, you just said it was an i5, so it's fast enough to do this. And you don't have any crazy software problems going on as far as, like, you know, McAfee or Norton or something along those lines. No, no, no, no. So then the last thing that you're going to check is, do you have a problem with the network adapter on your machine?", "start": 4360.34, "end": 4392.5, "words": [] }, { "id": 154, "text": " Which happens. So then you make sure that you've got the right driver for that. Or just grab a different network adapter altogether and plug it into your computer and see if you get a different result. I tried it also. I have a Wi-Fi feature in my \u2013 it's a mother \u2013 it's a mother board. And I tried the Wi-Fi, and it gives exactly the same results. Interesting. Exactly as in, like, you're getting \u2013 Same download speed using, like, speedof.me, that website.", "start": 4392.5, "end": 4420.62, "words": [] }, { "id": 155, "text": " Here's the other question I have for you. Is your Wi-Fi always on on that computer? Yeah, how about turn that off? Yeah, just disable that adapter. Okay. Because it could be defaulting to Wi-Fi, regardless of whether or not you've got a wire plugged in. I'm wired, huh? It could, yes. So turn that off. And that might give you a different result. And this is very much a problem for most Macs, by the way, is that people will wire themselves in for, like, Macintosh computers.", "start": 4420.98, "end": 4455.57, "words": [] }, { "id": 156, "text": " But the whole switching between wired and Wi-Fi is automatic and fast, and it very much confuses everything on the network. So if you have both, you should disable the one you're not using. So if you have Wi-Fi and wired capability on any computer, you pick the one that you're using and stick with it and disable the other one so that there isn't any confusion. I'm still showing the same kind of speed download around 12.5, right?", "start": 4455.57, "end": 4488.02, "words": [] }, { "id": 157, "text": " So I'm thinking that one of two things is happening here is that you've got a bad cable, which is a super easy fix, or that you've got some sort of interface, like some type of packet sniffing or a firewall problem on the machine that may not even be represented. It could be just Windows firewall is broken, which happens. So there's something going on that is affecting all of your network traffic on that machine. Erroneously, you know.", "start": 4488.02, "end": 4521.36, "words": [] }, { "id": 158, "text": " Maybe I was getting this. It's just mine doesn't show it like hers. Hers is much newer. That's an optimistic way to think about it. If you really want to try another speed test, you can go to fast.com. That's the one that I recommend right now, but I'm sure you're going to get the same results. Okay. I'll give it a swirl. Thanks, guys. All right. Thanks for the call. Bye-bye. All these weird network issues. It's the CIA, man. It's the CIA. They're all about it. We'll be right back. Welcome to the Hotel California.", "start": 4521.49, "end": 4551.22, "words": [] }, { "id": 159, "text": " Whether you're dealing with hardware installation or, heaven forbid, a virus, Mike Swanson is answering all your questions one by one. So call in or chat in with yours. The website? Gurushow.com. Tune in, click in, and kick back. This is the Computer Guru Show on AM1030, KVOY, The Voice. Welcome back to the Computer Guru Show. My name is Mike, here to deal with your technology needs and treat you like a person in the process and let you know what CIA is up to.", "start": 4564.85, "end": 4603.6, "words": [] }, { "id": 160, "text": " Because apparently that's my job now. Yeah, it's getting to the point where we're almost just going to have to ignore this stuff if we want to have a reasonable, nice show. Yeah, it's going to be a separate tinfoil hat wearing. Once a month, we'll just update you on all the new leaks. Yeah, we'll just do a podcast, a separate podcast for this. That's sad. Speaking of, if you want to get in on any of the podcasts that we do or any of the member-exclusive things that we're going to do, like the home automation platform.", "start": 4603.6, "end": 4630.42, "words": [] }, { "id": 161, "text": " then you can become a patron. You can go to patreon.com slash gurushow. Howard and I are already planning some more explosive stuff. You guys are all about destroying. I'm going to try to be about building. Well, you know, that's why we have you. So on March 7th, WikiLeaks began releasing things about the hacking arsenal that is held by the CIA.", "start": 4630.42, "end": 4658.69, "words": [] }, { "id": 162, "text": " Almost 9,000 documents that were obtained that show the capabilities that the CIA has when dealing with technology. And it's a little scary. Because there are things that we have been, as security experts, have been assured by the manufacturers that this stuff just can't happen. This defies the level of...", "start": 4658.69, "end": 4687.7, "words": [] }, { "id": 163, "text": " obfuscation that should be allowed. It turns out in many cases they were saying that with a metaphorical gun to the head. And some of them they just didn't know about. As an example, in Apple's case, their defense is, we didn't know this existed and we've already fixed most of them through patching recently that they found out about. So Apple says that they have fixed them, but to what degree? But then there's cases like, wasn't it Cisco just a couple of years ago that was found to be installing", "start": 4687.95, "end": 4717.52, "words": [] }, { "id": 164, "text": " exploits before you even received your product. Right. Basically, the governments could go to Cisco and say, we would like you for these particular orders or any orders that are going to these particular geographical locations to install a specific backdoor that allows the U.S. government into those routers. And in many cases, those were their hardware firewall products. So, you know, if you own the hardware firewall, you don't need to worry about it. Yeah, if you're already inside, all right, then it doesn't really matter. So, yeah, there's...", "start": 4717.52, "end": 4747.2, "words": [] }, { "id": 165, "text": " There's \u2013 in the CIA, you know, in their defense, right, they say that they are here to protect the U.S. from external invasion and terrorism attacks. You know, it just \u2013 at this point, it feels a little bit like the mob's protection racket. Sort of, right? And they say that none of this stuff is being used on U.S. citizens, but I find that mathematically speaking to be \u2013", "start": 4747.2, "end": 4776.21, "words": [] }, { "id": 166, "text": " A ridiculous assertion, right? As far as... Hey, it's just logically a ridiculous assertion. They're like, don't worry, we're not using it on you. Don't worry. Right. We're not allowed to do that. But the NSA wasn't allowed to do that either. Right. And so there's a certain amount of... As an example, I mean, just on a smaller level.", "start": 4776.21, "end": 4797.68, "words": [] }, { "id": 167, "text": " There are laws that are in place that says that public schools, because they're government entities, aren't allowed to do certain things. Then why is it that there are so many lawsuits between...", "start": 4797.68, "end": 4811.46, "words": [] }, { "id": 168, "text": " the public and the public school system regarding breaches of those rules. And it's blatant. It's not like it's something that's being hidden. It's because ultimately it's easier to ask for forgiveness than permission. And that's what I'm sort of getting at here is that you can go ahead and say that you're not allowed to do it. That's all fine and dandy until you do it. But why is there evidence to the contrary that you are doing it, even though you're not allowed to do it? So there's a certain...", "start": 4811.46, "end": 4840.0, "words": [] }, { "id": 169, "text": " I don't care what you are or are not allowed to do. What are you actually doing? And, I mean, personally, maybe it's the cynic in me, but I feel like a lot of it comes down to the CIA and the NSA just knowing that next news cycle it's going to go away. And the other part is that what is the oversight? Right. Who is watching the watchers? Right. And the answer is nobody.", "start": 4840.0, "end": 4861.63, "words": [] }, { "id": 170, "text": " Right. And nobody of importance or nobody that's looking out for us. Nobody who understands it, surely, because all the people who understand it work at the NSA or the CIA. Right. Or the FISA courts. Right. Right. Which are completely they're not allowed to say anything to anyone about anything that's going on. So who watches the watchers? Maybe we should have a class at the shop where we invite congressmen to come down and learn how the Internet works and how these these hacks work. That would be awesome.", "start": 4861.63, "end": 4888.78, "words": [] }, { "id": 171, "text": " It's free. Don't worry. We'll start with Jeff Flake and McCain. We won't even charge $9 million for the conference or anything like that. You won't even have to have a $40 breakfast. Just come down and we will show you for free the importance of security on the network and what happens when tools that are designed to be malicious are...", "start": 4888.78, "end": 4911.79, "words": [] }, { "id": 172, "text": " just left to their own devices because the CIA, which has an extensive arsenal of hacking capability, lost control of that, which means it's in the wild. Now, when we talk about that in a technological sense, in the wild means that it's out there. You could just go download it. Yeah. If you know where to look, it is very much available to you, and it can be modified in any way to be your own product. And make no mistake, that will happen.", "start": 4911.79, "end": 4941.46, "words": [] }, { "id": 173, "text": " Or is happening. Malware gains a whole new platform when you can't even detect that it's on your machine. Right, so if you were to link this back to another type of analogy, we already use the word virus when it comes to computers, and it also applies to people because they behave very much in the same way, where you have a piece of software that is programmed to do a very specific thing, and it will evolve.", "start": 4941.46, "end": 4969.98, "words": [] }, { "id": 174, "text": " to make sure that it survives, right? Because survival is, that's how things work. And now you're introducing things like general AIs, or you have artificial intelligence that's built into the virus itself that says, okay, if I run into this roadblock, let's try a bunch of different other things, and it learns. So how are you going to stop those types of infections? Well, the stuff that's coming out from the CIA", "start": 4969.98, "end": 4995.47, "words": [] }, { "id": 175, "text": " is along the lines of, let's say that it's not a virus anymore. This is a biological agent, right? This is one of these things where it takes on, and it's a difference in kind. It's not just executing commands and going, oh, that didn't work, error, error. It's like, okay, that didn't work. We need to try this instead. Right. This is along the same lines of something becoming epidemic or plague-like in nature, right? Because it's unstoppable once that stuff gets out there. In the famous words of Bill Paxton.", "start": 4995.6, "end": 5025.12, "words": [] }, { "id": 176, "text": " Game over, man. No kidding. And here's the thing. The latest release is they released something called the Marble Platform, the Marble Framework. And what this is, and this is just crazy to me, is that it's a piece of software that's designed to hide the CIA malware.", "start": 5025.12, "end": 5049.07, "words": [] }, { "id": 177, "text": " By obfuscating text and encrypting it and then decrypting only when necessary to run it, but still is designed to thwart forensic investigation. It's pretty much the software equivalent of when, you know, a classified document gets released and it has black bars across everything important. Right. So, yeah, basically it's redacting the manufacturer of said malware. And it manages to not only redact it.", "start": 5049.07, "end": 5077.81, "words": [] }, { "id": 178, "text": " But maybe put something else in there, right? Make it look like this came from somewhere else. As an example, I mean, there's been some stuff recently in, well, let's go back a little bit. Let's go to France, right? So in the France elections, and this was, let's see, what year is it? 2012 election in France. The CIA decided that they needed to know what was going on.", "start": 5077.81, "end": 5107.74, "words": [] }, { "id": 179, "text": " in the election of all of the parties. So basically they hacked everyone involved in the French election to find out whether or not or which particular candidates were more ideologically aligned with the U.S.'s interests so that they could then shape the perception and give other...", "start": 5107.74, "end": 5129.71, "words": [] }, { "id": 180, "text": " political parties, the ones that were more favored, information that maybe should be brought to light and maybe potentially influence the election of France. Wait a minute. That sounds kind of familiar. It does sound kind of familiar. Just a little bit. Oh, wait a minute. What's weird is that the malware that they used to do that, they didn't want it to point back to the United States, so it kind of looks like it came from Russia. When you hear things said like, it's almost like...", "start": 5129.78, "end": 5158.08, "words": [] }, { "id": 181, "text": " The Russians wanted us to know it was them. Yeah, I mean, because any good hacker, right? People smart enough to do this. They're not going to leave their fingerprints on it, are they? They wouldn't do that. That'd be silly. That would be dumb. That would be very, very dumb. So, let's just go ahead and make it look like it came from somewhere else. Now, if you fast forward to, I don't know, last year, where you have a major political party. In fact, hack attempts on both of them.", "start": 5158.08, "end": 5187.12, "words": [] }, { "id": 182, "text": " but only one of which was at least known to be successful. And it's really weird that it kind of looks like it might be coming from another place. So I don't know what the veracity of the claim is when it comes to...", "start": 5187.12, "end": 5204.27, "words": [] }, { "id": 183, "text": " whether or not the russians were very much involved or not the problem is that now it's no longer tinfoil hat stuff the tools literally are there and they are literally for that purpose exactly for that purpose they are designed to make it look like another state-sponsored attack basically you can put whatever fingerprints you want on the malware and we've got evidence that it happened", "start": 5204.5, "end": 5227.34, "words": [] }, { "id": 184, "text": " So it's not just this thing that's theoretical. You could do that. No, no, you've done that. They did it in the past and have had time to evolve since then. So the question now becomes, right, not whether or not it happened. It becomes whether or not you can believe who, just believe any detail of it. The mystery of lies or the web of lies has gotten so entangled at this point that you can't take anyone's word.", "start": 5227.34, "end": 5255.89, "words": [] }, { "id": 185, "text": " for anything when it comes to the technological aspects of any election anywhere. And that is the most frightening part of all. We're going to take a quick break. We'll be right back after this.", "start": 5255.89, "end": 5296.85, "words": [] }, { "id": 186, "text": " Mike Swanson, your computer guru, is just a click away. Listen and watch at gurushow.com. All right. If you want to take an opportunity to learn more about this stuff, you can contact us at the shop. You can call us at 304-8300 or you can come see us 510 East Fort Lowell or 64 North Harrison. Thanks to our sponsors, Desert Pro Commercial Cleaning. That is the best janitorial cleaning services in Tucson or TucsonDesertPro.com. Check them out.", "start": 5309.46, "end": 5336.13, "words": [] }, { "id": 187, "text": " And check us out over at azcomputerguru.com. We appreciate you listening, and we'll see you next week.", "start": 5336.13, "end": 5341.74, "words": [] } ] }