4.9 • 8.6K Ratings
🗓️ 9 June 2020
⏱️ 44 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | You ever drive by a prison or juvenile correction facility and see the prisoners outside in the |
0:09.8 | yard? Am I the only one who immediately starts looking at ways they can escape? Seriously, |
0:16.4 | I've parked and stared at prison fences multiple times when I was young, looking at how high |
0:21.5 | the fence goes, examining the razor wire on top, watching the gate, and these gates are |
0:26.8 | typically doubled up. You can go in the first gate and then they close it behind you, and then |
0:31.3 | the second gate opens. They never open both gates at once. And I like to look up at the guard |
0:36.4 | towers to see if anyone is up there. I'm sure they're looking back down at me. The windows of a |
0:42.0 | prison are typically too small for a human to squeeze through. They like to be really narrow |
0:46.6 | within a brick wall. And the fences are usually doubled up. If you can get over one, there's just |
0:51.6 | another one that you need to climb over, which gives the guards enough time to notice you climbing |
0:56.2 | over one and stop you from getting over the second. Getting out or in through these barriers |
1:03.1 | seems impossible. But get ready, because in this episode, we're going to test the security of a prison. |
1:15.8 | These are true stories from the dark side of the internet. |
1:19.6 | I'm Jack Recyder. This is Dark Net Diaries. |
1:43.2 | This episode is supported by Mimecast. You might be wondering if you need |
1:47.4 | more email and collaboration security. After all, you may already have Microsoft 365 protecting |
1:53.3 | your workspace. That's good enough, right? What, what could you need? Except one of your employees |
1:59.0 | just opened a phishing email and Microsoft 365 couldn't hand a little loan. Now your company has |
2:05.3 | ground to a screeching halt. Transformers, stop transforming. Circuits, short circuit it. I'll |
2:11.6 | be cousin an email. Next time, take five minutes to set up Mimecast. It's a security solution specifically |
2:17.2 | designed for email and workplace collaboration. It detects suspicious emails and diversifies your |
2:23.2 | security stacks. So you're not just relying on one generalized solution. Get another layer of |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from Jack Rhysider, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of Jack Rhysider and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.