Cracking the Code: Pen Testing and the Cybertruck Conundrum
NPI Tech GuysApril 17, 20240:24:5022.74 MB

Cracking the Code: Pen Testing and the Cybertruck Conundrum

We delve into the realm of cybersecurity through the lens of penetration testing, a critical and intriguing field that addresses the security vulnerabilities of computer systems by simulating cyberattacks. Penetration testing, often referred to as "pen testing," involves skilled professionals known as penetration testers or ethical hackers, who use their expertise in hacking tools and techniques not to cause harm, but to identify and rectify security weaknesses. Companies engage these specialists to perform simulated attacks on their networks, applications, and other digital assets, enabling them to discover and mitigate potential security risks effectively. This practice not only helps in safeguarding against actual cyber threats but also significantly enhances a company's overall security posture. Additionally, the podcast will touch on the broader field of ethical hacking, which encompasses various services beyond penetration testing, such as malware analysis and risk assessment, highlighting the essential role these activities play in strengthening network security.

We also explore the significant consumer dissatisfaction surrounding Tesla's Cybertruck. Owners have reported a range of issues from basic operational failures like the vehicle not turning on or charging, to more alarming concerns about visibility problems that pose safety risks. Critics, including those found on platforms such as Jalopnik, point to rushed production and cost-cutting measures as potential causes for these defects. The complaints have been so severe that some have been removed from forums only to resurface elsewhere due to their critical nature. 


[00:00:00] .

[00:00:19] All right. Happy to have you along my fellow Americans. Another episode of Tech Watch Radio

[00:00:24] takes you to the airwaves. Thanks so much for being alongside for the ride. We keep an eye on tech

[00:00:29] so you don't have to. Brought to you by NetworkProvidersInc.com and NPITechGuys.com for the podcast website.

[00:00:36] I've got Newman with me. Welcome, sir.

[00:00:39] Jay Harrison's in the mix too. Hello, my friends.

[00:00:43] Hey, if we get time, we're going to talk about that cyber disaster, Cybertruck deal.

[00:00:47] But before we get to that, we've got a very heavy topic we want to talk about.

[00:00:51] Pen tests. You say, what the heck is a pen test?

[00:00:54] When I was a kid, a pen test was can you write?

[00:00:56] But nowadays it's a little different, Newman.

[00:00:59] Yes, it is. It's not more of how can you touch your brain with a pen?

[00:01:03] But it's more of penetration testing and how your network will will succeed as well as the internals.

[00:01:11] The controls from that that you've set in place.

[00:01:15] And this has to do with firewalls.

[00:01:17] It has to do with rules in the firewalls.

[00:01:19] It has to do with open ports.

[00:01:20] It has to do with how your network is set up internally.

[00:01:23] If you have certain things that need to be isolated on certain intranets,

[00:01:28] if you've got internal websites for certain things that your employees use,

[00:01:32] it's all that stuff mixed together in a big test of understanding of, hey,

[00:01:35] how vulnerable you in every bit of these areas. Right.

[00:01:39] You're correct. And it's it's really there's a lot of levels.

[00:01:42] There's level one, two and three.

[00:01:44] But the first level is the surface level.

[00:01:47] It's a level one, J's level two, Newman's level three.

[00:01:51] That's right. That's right.

[00:01:54] Three, three is you have no life. You're just a geek.

[00:01:57] So I shouldn't have said Newman was level three then people.

[00:02:03] I actually live it.

[00:02:04] No, but really there is there is levels.

[00:02:06] And the reason that level is important is because, you know what?

[00:02:09] You don't need to take on level three right now.

[00:02:11] Just take on level one and work on it and then say, hey,

[00:02:14] now I'm ready to consider level two. Right.

[00:02:16] You're correct, because it entails a lot.

[00:02:19] And, you know, really a lot of people ask me, well,

[00:02:24] well, should I even do that?

[00:02:25] They go, well, you know what?

[00:02:27] Let me ask a couple of questions.

[00:02:29] Do you trust every employee that they have security training

[00:02:31] and they know what they're doing?

[00:02:34] Or are you under a regulation or compliance need?

[00:02:37] That's the reason why ultimately everyone should do it

[00:02:41] just so they know where their baseline is and what they need to work on.

[00:02:46] And remember, I don't believe most people are malicious.

[00:02:49] You know what? I'm not saying those people don't exist.

[00:02:51] They do. And you've got to guard against them.

[00:02:52] But really, you're what you're dealing with most of the time is people with the

[00:02:57] well, the road to hell is paved with good intentions.

[00:02:59] Is that how they say it?

[00:03:00] What I mean by that is, you know, people don't really even mean the harm.

[00:03:03] They don't really realize the ramifications until it's too late.

[00:03:06] And it's simply an error of lack of knowledge more than anything else.

[00:03:11] It's a misstep.

[00:03:12] It's not intentional or evil or sinister or that kind of stuff.

[00:03:15] It's just humans are humans and they do goofy stuff.

[00:03:19] Newman, you know what I would say also for the admins out there,

[00:03:25] you know, you get pulled in so many directions.

[00:03:27] Do you remember what you changed last?

[00:03:30] Whereas like, for instance, one company we went to,

[00:03:33] we did a risk assessment and we found out that port 3389

[00:03:38] was open on a second firewall that they had totally forgot about.

[00:03:44] Now, the admin didn't know about that.

[00:03:47] Also, he didn't remember that he had disabled the antivirus on his machine

[00:03:51] to test something and never put it back.

[00:03:54] These are things where they can be checks and balances for everyone.

[00:03:57] And we're not we're not trying to go after the admin.

[00:04:00] We're just saying, hey, look, you know what?

[00:04:02] Run that more than you want.

[00:04:04] And you'll know that you've oh, goodness, I forgot I left the back door open

[00:04:10] and go ahead and give it more as a set, a second set of eyes for the admin.

[00:04:13] And how do I think of it? Right.

[00:04:15] It totally is.

[00:04:17] And, you know, in the the point is, is that everybody gets busy.

[00:04:22] We make changes to train. Oh, did that work?

[00:04:24] OK, I'm going to change it back later tonight.

[00:04:27] You have a lot of things that go on before that night and you forget

[00:04:32] and it stays open for months and months because nobody's ever checked it.

[00:04:38] How often do people need to run these pen tests at how complicated,

[00:04:41] how expensive gives the breakdown?

[00:04:43] So the beautiful part is, is there they usually run about 250 bucks

[00:04:49] for the level one.

[00:04:50] But right now, network providers is providing a special that for free

[00:04:55] a level one risk assessment pen test on your environment till June 30th.

[00:05:01] And what that'll do is we can run it and see where your baseline is.

[00:05:06] But most people should run a penetration test every six months.

[00:05:11] That would be the key.

[00:05:12] So it's a semi annual event.

[00:05:14] And then you basically put those documents in a file

[00:05:17] so that if you have to, you can even go back and say, look,

[00:05:20] we know the breach didn't happen because we did the test on this date.

[00:05:23] We know that it was after that date or whatever.

[00:05:25] It's a help to narrow things down and create accountability as well.

[00:05:29] It is it is a protection if you ever need to pull that kind of documentation

[00:05:33] out, right? Correct.

[00:05:35] And that's the key is the documentation of all changes.

[00:05:38] Even if you're a medium to large business, change management

[00:05:43] will love this pen test because this shows that, OK,

[00:05:47] the changes are in place.

[00:05:49] They're actually what they say they are.

[00:05:51] Oh, but we miss these two.

[00:05:53] So you can go back and make sure that change management is successful.

[00:05:58] Tell me the difference between level one, two and three.

[00:06:00] Is there kind of a general understanding that you can explain?

[00:06:02] Yes. Yeah.

[00:06:03] Level one is more of a scan of the machine environment

[00:06:09] and they're going to do an internal.

[00:06:11] And then we also have the external IPs that we scan.

[00:06:15] We look for two F a encryption and a virus.

[00:06:19] Level two is all the above, but it also includes backup

[00:06:23] and email because we all know that, you know, three sixty five.

[00:06:29] We need to audit it from time to time so we don't get the middleman

[00:06:33] attacks, things like that IP spoofing.

[00:06:36] Level three is all about where you go on.

[00:06:38] So think of level one as a baseline.

[00:06:40] Think of level two as everything level one has plus email, plus, etc.

[00:06:45] And then level three is even double plus right level.

[00:06:48] Three is even education policies, procedures

[00:06:52] and maybe a simulated attack to see how it goes.

[00:06:56] So that's the point we want you to understand, folks.

[00:06:59] I.T. now has developed to the point when I started out in I.T.,

[00:07:02] one guy could just handle all the I.T. needs for a company.

[00:07:05] It's not even close to true anymore.

[00:07:06] There's just too many disciplines, too much knowledge.

[00:07:09] Unless you do something every day, you can't know.

[00:07:11] But we've gone to the point where now what we do is instead of just

[00:07:13] running tests internally and say, oh, look, our tests show you're good.

[00:07:17] Or, you know, hey, you know, you got a strong encrypted password

[00:07:20] for your email or whatever.

[00:07:21] Now we're starting to do active things

[00:07:25] to not only test the networks and the systems and for security,

[00:07:29] but to test the people involved.

[00:07:30] So, for example, we can send out test emails.

[00:07:33] And if you click on it, we can say, you know what?

[00:07:36] Thank heavens this wasn't a real.

[00:07:40] Fishing scam.

[00:07:41] This is our test.

[00:07:43] You know what? We got you.

[00:07:44] You should not have clicked on that.

[00:07:45] And then we provide feedback and training and guidance

[00:07:48] so that people get smarter.

[00:07:50] Same thing with this level three for the pen test.

[00:07:53] We can literally do our best to simulate a penetration

[00:07:57] and see how the system acts. It's quite different.

[00:07:59] It's another level from just saying I ran some tests and everything looks good.

[00:08:03] It's actually active interaction about

[00:08:07] how your system responds to different things.

[00:08:09] And we can probe that and test it.

[00:08:11] And that's how the best in the business do it.

[00:08:12] Newman, that's correct.

[00:08:14] And really, ultimately, we're not we're not there to find the flaws

[00:08:19] and everything.

[00:08:19] We're there to run a risk assessment, a pen test

[00:08:22] and show the vulnerabilities so that you're protected.

[00:08:26] And maybe cyber insurance is a piece of this or your regulations.

[00:08:30] You need to get a baseline for regulations.

[00:08:33] This is a great way to do it.

[00:08:35] This pen test also we're actually throwing in

[00:08:39] something else that ties to this.

[00:08:41] And we're actually doing a dark web scan

[00:08:44] as part of this penetration test and risk assessment

[00:08:48] so that we can find out what's really on the dark web.

[00:08:51] Now, I want to explain the dark web a little bit,

[00:08:53] because I think people are confused.

[00:08:54] It's not a different place than the regular web.

[00:08:58] It's different in that

[00:09:02] there's different ways to access it or connect to it.

[00:09:05] So my point is it's not you know, you don't have to,

[00:09:08] you know, get a computer that can support the dark web or anything.

[00:09:10] It's not a different location.

[00:09:12] It's just merely different ways of accessing things on the regular web.

[00:09:15] But they become the dark web because it's kind of all underground.

[00:09:18] It's hard to know who's who.

[00:09:20] It's hard to know what's what.

[00:09:21] It's just like driving.

[00:09:22] Well, it's just like walking down an alley as opposed to walking

[00:09:25] down the normal streets of society, right?

[00:09:28] It really is.

[00:09:29] The dark web is a whole different place where things are bought and sold.

[00:09:34] Identities are bought and sold.

[00:09:37] It's just it's really dark.

[00:09:39] It's it's got a lot of nefarious type actions to it.

[00:09:43] Think about it as the back alleys of the Internet, right?

[00:09:45] It really is.

[00:09:46] It's it's like it's just the the sewers and, you know,

[00:09:50] the dark Batman type atmosphere.

[00:09:53] That's where that's where a lot of stuff goes on.

[00:09:56] And and people often, you know, treated as like in marketing,

[00:10:01] they put a hacker inside of a vault room and that it's even worse than that.

[00:10:06] I mean, it's just you you get some horrible stuff.

[00:10:10] And with that, whenever we do a dark web scan,

[00:10:14] we always find current passwords for customers on the dark web.

[00:10:19] And this is a reason why is because the biggest of companies get breached

[00:10:23] and hacked all the time.

[00:10:24] And you know what?

[00:10:25] It's impossible to stop it because it's not even you that got hacked.

[00:10:28] Correct.

[00:10:28] Whoever had your information that got hacked and they wholesale leak all this stuff.

[00:10:33] I even sometimes wonder if it's intentional

[00:10:35] part of some of these companies that happen so often.

[00:10:38] And that's what, you know, we have internal employees that leave to scramble.

[00:10:43] They also can, you know, sell off things.

[00:10:46] And a lot of times they do, especially at bigger companies,

[00:10:49] because they don't get caught,

[00:10:51] because they might have just been a bank teller or something else.

[00:10:53] And they get on the dark web, they sell, they make their money

[00:10:56] and then they move on.

[00:10:57] And ultimately, we find that

[00:11:01] we can also in this first risk assessment, this level one,

[00:11:05] we can crack the passwords on Windows

[00:11:08] and then provide just a hash of it so that they can see.

[00:11:12] And I'm not going to lie, 90 percent of the time

[00:11:17] people do passwords with the company name in them.

[00:11:22] Not good, not a plan, people get a strong password manager,

[00:11:27] make all your passwords unique to everything you do

[00:11:30] and make sure that you don't even know the password.

[00:11:33] OK, so you want that kind of zero trust component involved, right?

[00:11:36] Correct. And that's where this can come into play is we can also look at

[00:11:41] how many characters you have, how many are you doing,

[00:11:45] intruder lockouts, things like that.

[00:11:47] This is the baseline risk assessment to give you that.

[00:11:50] We've gone into companies where they had three characters minimum

[00:11:53] on their password and no intruder lockout.

[00:11:58] So we find it and then we want to help fix it or you can fix it.

[00:12:03] And, you know, sites are getting better at this.

[00:12:06] They're requiring two factor or multi factor authentication.

[00:12:09] They're starting to demand that you have longer passwords,

[00:12:11] that they have letters and numbers and mixed case

[00:12:14] and special characters and things like that.

[00:12:15] So we're getting better all the time, societally speaking.

[00:12:19] But you don't want to be the low hanging fruit.

[00:12:20] That's really the bottom line point that we're trying to make.

[00:12:22] Jay, do you have any follow up input or questions?

[00:12:25] Well, I was going to ask you when you do penetration testing

[00:12:27] and you've got these levels one, two, three,

[00:12:30] you're doing everything software wise.

[00:12:32] Do you guys ever handle any physical like security penetration

[00:12:36] testing locks, server rooms, things like that?

[00:12:38] Or is it all? Yes, that's actually that's part of the level three

[00:12:42] because we look at policies and procedures.

[00:12:45] And if you don't have locks on your server rooms,

[00:12:48] you don't have key access.

[00:12:49] You're not tracking the visitors that are coming into the environment.

[00:12:53] These are all things that we educate people on,

[00:12:55] because ultimately you've got not just ethical hacking,

[00:13:00] you have social engineering, things like that

[00:13:04] that can be put in place to test these policies.

[00:13:09] You also have pre texting where, believe it or not,

[00:13:11] it's not even a super high tech solution.

[00:13:13] It's just that I get on the phone with a girl and she gives me the password

[00:13:15] or she hey, I'm with the ID department.

[00:13:17] I need to do this and this for you.

[00:13:18] And she divulges this or that.

[00:13:19] And a lot of times it's just pre texting.

[00:13:21] Jay, it's super simple, but yet it becomes very elaborate

[00:13:24] and it's carrying out of the simplicity where they got the information.

[00:13:27] Then they do some real sinister stuff.

[00:13:29] But it was very simple how it all started out.

[00:13:31] Yeah, the social engineering.

[00:13:33] That's the hardest one, I think, to prevent.

[00:13:35] You know, you can have software and safeguards and physical access,

[00:13:39] but people are sometimes the weakest link as far as they're able

[00:13:42] to get duped by people.

[00:13:45] All right, if you want to get go ahead, Newman.

[00:13:47] Well, I was going to say you actually just put pictures of Hawaii

[00:13:51] on a CD with a program.

[00:13:54] They end up always taking that CD when we did it at one bank in New York.

[00:13:59] We ended up getting 45 machines inside of two hours.

[00:14:02] Oh, my gosh.

[00:14:04] Reminds me of people seeding a parking lot.

[00:14:06] I got a ticket for you, buddy.

[00:14:07] Yeah, remind people seeding a parking lot with thumb drives

[00:14:10] just to see who will pick them up and stick them in a machine

[00:14:13] to see what's on there.

[00:14:14] You're right.

[00:14:15] Thumb drives off eBay.

[00:14:16] What's more dangerous than that?

[00:14:18] I mean, yeah, I just don't get these people

[00:14:21] that are streaming and doing this.

[00:14:22] So amen to that.

[00:14:24] All right, ladies and gentlemen, if you want to get an inexpensive

[00:14:27] assessment, either level one, two or three network providers,

[00:14:30] Inc. com has a special right now.

[00:14:31] Go there, get it done.

[00:14:33] If you want to spread this show to your friends and loved ones

[00:14:36] and people who may need it, NBI Tech guys dot com gets that done.

[00:14:40] You know what?

[00:14:40] We're we're on Apple and iTunes and we're everywhere.

[00:14:44] Spotify, all those different listening opportunities

[00:14:47] are available with NBI Tech guys dot com or just go to the website.

[00:14:50] The website is pretty cool, though.

[00:14:51] You click a button and it's all the podcasts, all the shows.

[00:14:54] You click the switch and pretty soon you got all the news

[00:14:56] from network providers on the same site.

[00:14:59] So it's pretty neat.

[00:14:59] Make that a bookmark in your world, would you please?

[00:15:03] All right. I want to wrap up this

[00:15:05] episode by talking about the cyber truck.

[00:15:09] Headline says cyber truck owners are not thrilled.

[00:15:13] Quote, what a nightmare.

[00:15:15] Tesla is getting slammed in the forums

[00:15:17] after they released their cyber truck.

[00:15:19] The truck is dead.

[00:15:21] I'm waiting for a tow truck.

[00:15:24] One customer writes, tried everything, restarted, did all this.

[00:15:27] That doesn't work now.

[00:15:28] Look, Elon Musk, you could have seen the writing on the wall with this.

[00:15:31] He he demonstrated the truck literally shattered a window

[00:15:34] that wasn't supposed to break.

[00:15:35] That's how it started out.

[00:15:37] Then he promised that they would be delivered at a certain time.

[00:15:39] It never was.

[00:15:40] Finally, they're rolling out the assembly line, but everybody says

[00:15:43] they're not what they hoped that be.

[00:15:45] How do I return this thing?

[00:15:46] How do I?

[00:15:47] And they're finding that people are ending up on the side of the road.

[00:15:50] If it's super cold or hot,

[00:15:53] the amount of charge they have was supposed to last a certain amount of miles.

[00:15:55] It's not.

[00:15:56] Then if you're towing something and it's cold or hot, just forget it.

[00:15:59] You can't even go anywhere.

[00:16:00] There's not enough.

[00:16:01] Even Tesla has more charging stations than anybody else,

[00:16:03] but it's not enough. People are getting stuck.

[00:16:06] The if these trucks have a problem or any of these

[00:16:10] EVs or electronic or electric vehicles or whatever you want to say.

[00:16:14] A lot of these are they're catching on fire.

[00:16:17] If they get flood, then their salt from the salt water

[00:16:20] that then eventually combusts and it they're too heavy for the roads.

[00:16:25] This is just a disaster.

[00:16:26] Jay, your thoughts, and then we'll go to Newman.

[00:16:28] You know, I I personally I don't own a cyber truck, so I can't say

[00:16:32] how good or bad they are.

[00:16:33] I've only can look at people's reviews.

[00:16:35] I love the concept, though.

[00:16:36] I love the idea of this hardened truck electric futuristic.

[00:16:41] I mean, I love the way the thing looks.

[00:16:42] A lot of it gets a lot of grief over that.

[00:16:45] So I'm kind of a fan, but I don't know.

[00:16:47] I mean, the reviews are coming in and people are having some problems with them.

[00:16:51] So it's a mixed bag.

[00:16:53] But I admire Elon Musk for he has an idea

[00:16:58] and he and he puts wheels on it, man.

[00:17:00] He makes it happen.

[00:17:01] And that's pretty interesting.

[00:17:03] I agree 100 percent.

[00:17:04] But how much of these things cost?

[00:17:06] Well, they're expensive, no doubt.

[00:17:08] I mean, you know, they were supposed to be 40 grand.

[00:17:10] Now the base model is about 60.

[00:17:13] You can get in, you know, the super model for like a hundred or a hundred thousand.

[00:17:17] But if I spend that kind of money, 40, 60, 100 on a vehicle,

[00:17:20] I don't want to be the guinea pig experiment.

[00:17:23] I know, but it's bleeding edge technology.

[00:17:26] You know, it is it is the cutting edge.

[00:17:28] And so you've got some of that, I think, when you're almost like an investor,

[00:17:31] if you're buying a cyber truck and like a capital, you know, venture capitalist,

[00:17:36] you you don't know if the thing is going to happen.

[00:17:38] It's brand new. There is no history on it.

[00:17:41] But I love the concept.

[00:17:42] I just got to say, you know, if there's if there's a fanboy on the show,

[00:17:45] if it is worth it, it'd be awesome.

[00:17:46] I would I believe that there should be just like perpetual motion energy to it.

[00:17:50] It'd be incredible. Right, Newman?

[00:17:52] I totally agree.

[00:17:53] I mean, and the thing is, I would have expected, you know, solar panels

[00:17:56] all across the vehicle, you know, to say you didn't have to be at

[00:18:00] so many fill up stations. Yeah.

[00:18:02] And so, you know, but it it really is.

[00:18:05] It's great technology.

[00:18:06] It's just it hasn't been tested like it should have.

[00:18:10] And, you know, it's funny problem with the progress

[00:18:12] in the technology or anything else.

[00:18:13] My problem is that they're mandating these things and people are being forced

[00:18:16] into these worlds where it's just not a reality.

[00:18:19] I mean, I got to get from A to B.

[00:18:21] That's what I need.

[00:18:21] And, you know, when I was a kid, it was like,

[00:18:23] can you afford a car that's reliable?

[00:18:25] Well, now you can you afford to buy a car that's what?

[00:18:28] Now it's not worth the dollars.

[00:18:30] It's not reliable.

[00:18:31] Yeah. People are not buying these like they thought they could mandate and do.

[00:18:36] And, you know, it's it's it's the fact that like

[00:18:40] watch the YouTube of people that try to run through a puddle.

[00:18:44] And now they're Tesla trucks completely fried and.

[00:18:47] Oh, no. It all based upon one that I saw was a sensor in the fender

[00:18:52] that was under the fender sealed up, got water in it

[00:18:56] and fried the rest of the truck.

[00:18:58] So it's kind of it needs a little bit more usability testing.

[00:19:05] It's got to be tougher.

[00:19:06] Anyway, I don't mean to mock it, and I don't mean to make fun

[00:19:08] of anybody who's bought one of these.

[00:19:10] And I don't I don't mean to be flippant like that.

[00:19:12] I laugh a little bit because, you know, again, it's the

[00:19:16] it's the big showmanship up front where this thing is incredible.

[00:19:20] You've got to get one.

[00:19:21] It's 40 grand.

[00:19:22] And look, the windows won't even shatter.

[00:19:23] And then the windows shatter and it's not 40 grand.

[00:19:25] The now it doesn't run.

[00:19:26] And it's just like, man, I don't mean to be rude,

[00:19:28] but why don't we do a little bit more testing before we do that?

[00:19:31] Quote marketing.

[00:19:32] I'm just thinking.

[00:19:33] And it's not the testing that YouTube did

[00:19:36] where a lot of the one got the Cybertruck went out with a 50 cal

[00:19:40] and started shooting the doors and everything.

[00:19:42] Now, I'll drive one of those around that have the bullets in the doors.

[00:19:46] I kind of think that's cool, but that is way cool.

[00:19:50] But yeah, I mean, testing, though, day to day, like get the CEO

[00:19:54] and put him in California like San Francisco or something or whatever, L.A.

[00:19:58] And say, you know what?

[00:19:59] I need you to drive to New York in this bad boy and just drive.

[00:20:02] Don't do something crazy.

[00:20:03] We don't need, you know, to do the Ram tough whatever test.

[00:20:07] We just need to like do mere mortal driving tests.

[00:20:10] Hey, when it's cold, does it work?

[00:20:11] I drove it in winter. I drove it in summer.

[00:20:13] It worked great every time.

[00:20:14] I even towed my trailer and it worked great.

[00:20:16] Those kind of basic.

[00:20:18] We talked about baselines and our testing.

[00:20:20] What about baselines in this?

[00:20:22] It's like I want the thing to run and get me to be.

[00:20:24] Well, we'll do the fancy testing and the cool marketing whatever later.

[00:20:29] Right. But they didn't do that stuff is the problem.

[00:20:32] And the reason I bring this up now is I want you to compare that

[00:20:34] to your own internal I.T. at your company.

[00:20:37] Do the basics, do the testing, do the reality checks.

[00:20:41] And that's what we're here to help make happen.

[00:20:42] Newman, are you headed for an electronic fire in your vehicle

[00:20:47] or your network?

[00:20:48] I mean, these are things that we need to check

[00:20:51] and we need to know before it happens.

[00:20:55] Yeah, it's like the country song, you know, your truck catch on fire.

[00:20:58] I'd rather roll it down a hill than I would rather have a coupe de Ville.

[00:21:01] Right. So I've got to have the truck.

[00:21:04] Jay wants one of those cyber trucks.

[00:21:06] He's waiting for one used, aren't you?

[00:21:07] Jay? Yeah, I haven't seen them on the used market yet.

[00:21:10] So yeah.

[00:21:11] Yeah. When you get a used one, it won't have a good battery, though.

[00:21:13] That's the no.

[00:21:14] And then the battery will cost just as much as the vehicle.

[00:21:16] No, because if somebody loves it, they probably aren't going to sell it.

[00:21:19] Right. Maybe so.

[00:21:22] Anyway, I hope they get their act together,

[00:21:23] because I do agree that it's very cool technology to keep an eye on,

[00:21:26] to watch, to learn about and eventually hopefully it can roll down

[00:21:29] the road.

[00:21:30] I mean, I'm not saying that

[00:21:31] the torque enumer is incredible, the power that they have is incredible.

[00:21:34] They're even talking about the semis.

[00:21:37] Now, I don't know how well that's going to go.

[00:21:39] But yeah, there are other companies like Edison that's trying to do

[00:21:42] EV semis and but I love to see the innovation.

[00:21:45] And, you know, as a technology show and as a technology person,

[00:21:49] I'm always looking forward to that stuff.

[00:21:51] And we know that a lot of it doesn't pan out.

[00:21:52] I mean, one of the things we've always said on the show

[00:21:55] is that we want to make sure that we're not just making

[00:21:57] something that's not going to pan out.

[00:21:59] I mean, one of the things we've always said on this show was

[00:22:00] you kind of avoided some of the stuff until it was really for market

[00:22:03] and really you could get your hands on it because there's so much things

[00:22:06] that turn out to just be vaporware.

[00:22:08] They never, you know, they talk about things

[00:22:10] and it never even makes it to market.

[00:22:12] So I care about anything with the truck.

[00:22:15] All I want to know is that the radio works, Newman.

[00:22:17] Come on. That's right.

[00:22:18] It does. Does it play?

[00:22:20] Does it have any type of, you know, Billy Idol or even,

[00:22:25] you know, Ozzy Osborne or tech tunes?

[00:22:27] You got to have tech to write your tech tunes.

[00:22:31] All right. Anyway, later, we want you to know that we are available

[00:22:34] to do pen test penetration tests.

[00:22:36] There is a special on the now network providers, Inc.

[00:22:39] Dotcom to go ahead and get that.

[00:22:41] We can also just talk to you about anything you want to.

[00:22:42] You're just like, hey, I've got a few questions.

[00:22:44] I don't know where I want to start.

[00:22:45] You know what? We're here for all that and more.

[00:22:48] If you want to spread the word about the show,

[00:22:51] if you want to get it on a radio station in your market,

[00:22:53] please get a hold of us.

[00:22:54] We'd love to hear from you.

[00:22:55] Npitechguys.com for that.

[00:22:58] You got the shows.

[00:23:00] You can listen to them anytime on demand.

[00:23:02] You also can click that button and then read all the different tech

[00:23:05] tips and notes and headlines that we bring forward on a consistent basis.

[00:23:09] If you go to network providers, Inc.

[00:23:11] Dotcom, you can sign up for the email list

[00:23:13] and get those incredible tech tips and training and education tidbits.

[00:23:16] Believe it or not, those are free and they take you a long way

[00:23:20] when it comes to simple understanding of what to do and what not.

[00:23:23] To do when it comes to things that happen,

[00:23:27] you know, fishing or, you know, your computer network or your computer.

[00:23:30] You know what? I'm at a cyber cafe or I'm here or there.

[00:23:33] I'm going to Starbucks or what?

[00:23:34] You know, hey, don't just connect to those networks and think it's all cool

[00:23:38] because, you know, you connect to too many things.

[00:23:40] You're a little too loose with your connectivity and it doesn't go well.

[00:23:43] You get all kinds of viruses and stuff like that.

[00:23:45] And so we want to make sure that you.

[00:23:48] Have enough knowledge to make sure you're not the low hanging fruit.

[00:23:50] It's always a risk reward analysis,

[00:23:52] but we're convinced that we can make sure that that you're in pretty good shape.

[00:23:56] And believe it or not, the 80 20 rule here works.

[00:23:59] You know, you get a little bit done.

[00:24:01] It takes you a lot further than you think it does.

[00:24:04] And even though you say, you know what?

[00:24:04] I don't have all of it done.

[00:24:06] A little bit goes quite far, Newman.

[00:24:09] It truly does.

[00:24:10] I appreciate this avenue of getting this information out to everybody.

[00:24:15] All right. Final thought, Jane.

[00:24:17] Now, I appreciate it.

[00:24:18] We look forward to seeing you guys next week.

[00:24:21] All right, ladies and gentlemen, two episodes come out a week.

[00:24:24] It's on Saturdays live on your radio stations

[00:24:28] and NPI Tech guys dot com.

[00:24:30] The Loving Liberty Radio Network carries the broadcast as well.

[00:24:33] Loving Liberty dot net.

[00:24:34] And then it's two podcasts a week come out one on Saturday

[00:24:38] and then the other one on Wednesday.

[00:24:40] And we keep an eye on tech so you don't have to.

[00:24:41] Thanks so much to all of you from us, the Tech Watch team.

[00:24:46] Make it a great tech day, will you? Thanks.