 I'm here from Lawrence Systems and we are live with Vlog. There's a 234, Windows 365. Everyone's excited. Windows is a service. Desktop is a service because that's the solution that'll solve all our problems, right? I've seen that and I brought it up. I don't usually cover that topic on my channel, but it's obviously something that we really do. So I'll be bringing it up a little bit, but it's not that exciting, folks. Sorry, Microsoft's actually offered this through their Azure platform previously. So this is a slight variation on a more or less current offering. I don't know. I think it's another way to get attention to it, but I don't think desktop as a service is the most amazing solution to the Windows problem. And it's not a cheap one. So it's not for everyone. It's for people that can spend that kind of money on it and things like that. So that's my, we'll talk about that in a minute. So live here, we got people checking in. Any of the UK people know a good Microsoft 365 re-seller. You know, that question comes up and I don't know the answer at all, but feel free for those of you that do know. The challenges get confusing when you have all these different resellers and partners in it. I really dislike most of the partner program stuff. It's messy. I don't know why Microsoft just isn't, I guess they just don't want to dedicate. I can't say they don't have the resources. Don't want to dedicate just handling it themselves. Doing things through the third parties that are out there for the resellers is just messy, confusing. And of course, Microsoft doesn't make it easy to resell their stuff. And that's just, yeah, the Azure Virtual Desktop, for example. And let me find my tweets. We'll actually start that. I should probably pull it up beforehand, but hey, if it wasn't for the last minute, nothing to get done. We'll pull up the Nerdio site. They had a good write up on it. But one of the things right away about the way it's sold and I'll tweet this out. I'll drop a link in there as well. I guess we start talking about this. The share screen, whoops, share. There we go. Clicking the wrong button. Chrome tab. Windows 365, Azure Virtual Desktop, ABD, comparing the two desktop as a service products. They did a really nice technical breakdown of how all this works and how all this ties together. And I think that's pretty cool. Nerdio, if you're not familiar with them, they're kind of a go-between. And I used to not completely understand why Nerdio existed. And then after working with the Microsoft products, you understand completely why Nerdio exists. And companies like them, and I don't use them, but they're a go-between, so to speak. They are a way to make it easier to resell desktop as a service with the whole Microsoft platform. But what's crazy to me is just how long this write-up is because it's so nuanced and so many details and what works, what doesn't work. It's not an easy product. And then to go on top of that, to go on top of that and the fact that Microsoft will probably change it a few times and tweak it, you need a team on top of it just to figure out how to sell it and how it changes and why your build didn't match because there's a new feature or a feature they removed or just a different way they handle it. I don't think we're ready for desktop as a service for the most part. I see people pitching it, but I also see the big downside. The expense of it is one of the problems because for what you spend on desktop as a service, you can buy a new desktop every year. And that's one of the big challenges with it is it's not cheap. So if you can keep buying a desktop at the same rate, then why would I put it? Oh, the convenience of the cloud. That is for a niche customer, not bad, but yes, it's one of those things. I'm jumping through the CSP, which is the customer reseller program system. CSP now, not a fan. I should just be able to easily get set up and sell and take over existing tenants. Oh, if it was only that easy, it's just everything. And yeah, I hate having to work through a partner just to get a Windows Server SQL license. Just take my money and give me my key. Yes, this is how more companies should work with Direct. It's such a pain in the butt trying to get it through these people because they also want to spend time on the phone upselling you. And I'm like, stop upselling me. I just want to get a thing because I'm trying to accomplish something. So yeah, I'm not sure where you get the $59.99 a month. I would actually commented that desktop as a service is going to start at 32 a month. But of course, by the time you add in things like Office 365 and everything else, I don't know. It's kicking the ball down the road a little bit. Here's the reality of it. I've commented numerous times on my channel about this topic. All new applications being built that are line of business applications will give a little bit of a qualifier for it. When you're using and you're looking at way companies are building out new line of business applications or making web-based applications where they don't run as a desktop service. The reality is the reason you want desktop as a service is because you have some legacy Windows applications you want to run and because Windows is notoriously Windows for all the shortcomings it can have when there's updates and problems, desktop as a service can make sense in those, whether you're delivering the application services or that. But it's always based on the way we legacy have always done things versus the new way things are being done where everything is web-based. And it's one of those things like, eventually we're going to not have to need the same level of applications. More things are just going to be web-based. This is one of the reasons the browsers are such a popular attack service because all the extra functionality and where people are going with these apps have made them a richer target for threat actors. But to the same extent, it actually makes in some ways a little bit easier to secure because of the way you secure it. And running a bunch of desktop applications is just, yeah, what could go wrong? Running a bunch of untrusted applications. Oh, you want to try and sign them and get them trusted because that'll fix it until it doesn't and all the other issues we've had. So, but yeah, little by little, I don't think we're going to get there anytime soon. The fact that Microsoft's rolling this out makes this much of an explainer and Microsoft's explainer is, I think, more confusing, but yeah, that's what we're going to do. Slowly we'll get there. One day we'll have just a better ecosystem for tech. It's this evolution of things. The tale of legacy is long. And yes, can't agree more about the desktop service versus local machine. Most businesses just don't need it yet. Niche customer for sure. Useful if you don't already have to jump boxes. RDS, yes. And it creates a dual threat layer because one of the pitches I had seen by another company was that they were offering some of the security with their desktop as a service. But you still have to also offer a layer of security on the device that's connecting to it so it doesn't get compromised. So now we have two different devices. I got to make sure I have the one locked down in the cloud and then the device they're using to access the one in the cloud because, yes, that's a popular target to go after the device that they're getting to that. So it's not like you've just completely solved the threat problem. You've actually kind of changed it. And then some of the nuances that broke down over NetNerdio is we actually pull it back up so I can find it on there. I don't think you get... I believe it's... Let me find it real quick. I read through this this morning. Because you don't get to choose exactly where, this means routing security and VPN and IP addressing cannot be controlled by the customer. So this is some of the nuance. You have to be upsold again on getting more granular control on how the firewalling and egressing works. So that makes it that much more confusing again if you're trying to do threat intelligence where you want to look at the firewall, look at the ins and outs, and how a threat happened and things like that and what IP address are coming from. When you're spinning up in the cloud, you don't natively get that, but I believe it's part of a different tier where you do get to have more control. It was a lot. So it's... Yes, just... I don't know. I don't think we're there. And someone says, does it run in a browser? And I think you're asking about the new stuff. I think that's some of the access goals Microsoft has to be able to connect using a browser, so to speak. I don't know what Windows dependencies it'll have. I didn't dig that far into how they're deploying it. So nonetheless, I don't think we're really... We're not there. At least I'm not there. I'm not saying it's the end-all solution of things. And matter of fact, when I screenshot this, I was... Do I have it? Because I was mad. Mad is not the right word. So I'm going to read it because I don't want to call the vendor out, but this is the top-line item. It wasn't nerdy. I'll just say that. The vendor pushing managed desktops. Learn how to sell your virtual workspace-managed clouds to increase your revenue with clients. Their pitch isn't about how it solves a problem. Their pitch is how it will increase revenue with your clients. And I'm like, that's important. I'm in business to make money. Don't get me wrong. But when product companies come at me and their first pitch is how it makes money, not how it solves a problem or will enhance security or does a service for my clients, I always like, why is that the lead all the time? I want to understand how it solves a problem. Cool that I can make money with it. Because that's going to be... I care that I can make money with it. Like I said, I'm in business to make money. I'm a for-profit company. So yes, that is a factor, but it's like the lead many of these companies have is how to increase your revenues by selling our stuff. But does your stuff solve problems? Well, no, that's besides the point. You'll be able to increase revenues with it and that's the problem we plan to solve. You need more money. You would like to extract more money from your clients. Use our product because it's a product that helps extract money from their pockets. That's like the sales pitch for the first 20 minutes and you're like, I want to know how it solves a problem. How is that different than AWS Workspace that has been around for years? How it's different is Microsoft makes money selling licenses to AWS Workspace who sells the compute time and Microsoft's able to, you know, fund their own licensing differently. But no, it's really not. I don't think it's that much different. So yeah, I don't know. Win 365 runs from a web browser, RDP client, iOS, Android soon to be Linux, at least according to today's MS Inspire sessions. Yes, I had heard that too. I heard it from a few other people that watched those sessions so that I will give that as a very, very plausible to be true. I have not fact-checked you, William, but makes sense to me. It solves the problem of your client having too much money. That's actually a great sales pitch. Does your client have too much money? We have this wealth extraction tool we'd like to sell you. We get a cut of it. You get a cut of it. The client, they get our solution. But what does your solution do? It extracts money from the client. What do you mean? What does it do? It doesn't have to actually do something, does it? Yeah, some companies don't have, at least from my perspective, the best sales pitch, goes back to the scene with these partner portals and programs that we were ranting about. They're just not how they could be, not how they should be. But there are other topics in here because we can't get Kaseya out of the news, can we? And I think we'll start with my Twitter for that one. Kaseya, I'm kind of aggravated with the statement people have been making that I will have some qualifiers for so they pull up my tweet and then follow up with the click. So, share screen. And that's this right here. So, here's where we pay more for licenses than hardware. Yeah, that's true too. I will say that's becoming a real thing for the most part. Softwares, I stay out of the hardware market as much as possible because hardware is a race to zero margin all the time. And we try to avoid it because I just don't care enough to try to resell hardware and things like that. It's just, we don't mind if the customer, we make more money ourselves just like how there's more money licensing. The labor exceeds the hardware. The labor is where we make money is selling and leveraging the knowledge we have to provide a solution for clients. That's where my margin is. Not in trying to make a markup on something that someone else, basically what I say, race to zero margin unless you are the one manufacturing the hardware is someone calls you and wants a PC of this spec and then they want the same, you know, Dell or Lenovo PC from someone else and now it's just a matter of who's going to cut their throat the most to make this sale. And I don't care. I'm like, buy it direct guys. Just go on Amazon and get it. Whatever. Here's the model number. Go get it from Amazon and we'll do all the labor to set up. The labor to set up is more margin than I'll make selling 10 computers. And it's just, that's where, that's where the market's gone to. This right here though. And this trusted sec, according even Kyle from Hunter's Labs, I think he tweeted, hey, kind of quick that you guys dumped this, but we're here now. We're here now. And this is the problem I have when people keep saying it can happen to anyone. And now I'm very empathetic to the situation that the MSPs are in. I'm not throwing them under the bus. I am empathetic in some ways to say, I like, hey, such this happened to you guys because it's not just the CEO. It is a lot of people that were damaged by this, but it can happen to anyone is true. If you are being attacked by a sophisticated threat actor, I'm sorry, it is very hard to survive against a sophisticated attacker. The problem is the code is so broken in the Kaseya system that it's not a sophisticated attack at all. It's an opportunistic one that I can't believe didn't happen sooner. Someone just didn't look around for it. And this goes to the point of one Kaseya has had more than one security incident. This is not their first time dealing with their tools being used against them. But the code in question here, but this code is so broken it did not take a sophisticated attacker just an opportunistic one to explain this flaw. This is that flaw. Else login, okay. I just wanted to call the vlog that, but I thought it'd be, it wouldn't be as like to the point it's kind of nuanced, but else login, okay. The two last statements where the interesting thing happens in case of password equals no password, the login will fail. However, in the case that all checks failed, it would default to an else clause that sets login, okay to true because no password is provided to request the password variable would be null and login, okay. Would end up being true when login, okay is set to true. The application sends the login session cookie will eventually, and will eventually, if no other parameters are provided like with the attackers did, end up in an if clause and returns a 302 redirect to the user portal. They failed open on this by sending null passwords. You can't tell me your company went through code reviews by any competent pentester and I see it, I'm just saying like if I'm not an expert on this I'm not a secure code writer but I think fail opens bad and I think this is bad based on analysis by people who are much smarter to me at coding that this is bad and that it's one of the, and you know this is a mailware tech and he's obviously got some attention here by posting it and you know that was with it which actually it's funny because I like the mailware tech and Swift on security I know you got that reaction image from me and you're welcome so it just there that is definitely my feelings on it too right there so yeah it's really aggravating so I will go back to the statement of the fact that yes this can happen to anyone but you should be doing at least some of the basics some of the pentesting some of the application testing should have been done by these people and seeing things like that makes me think it was not done it was not done thoroughly it was not done by that companies are also not doing a good job of being public about this this is one of the problems and in another forum I had a private discussion about this and let me pull it up because it is very relevant I'm going to pull these links up and switch over to another browser weee so open it up everything here I didn't know if I should do a video on this particular topic but anyway I still might one more link to open up and it's this company here there we go so share that one right there key basis not softer than tofu now I know key base got bought by zoom so they're not you know they're still existing they're still updating their stuff but yeah it's it's an issue and they did a whole security audit and write up and transparency and this is one of those things that is really important that they do security and pen testing but how do you know they did it well in their case they actually did the entire breakdown listed all the things they did how things were done broke I mean this is pure levels of transparency on your code then let's talk about zero tier here's their assessment and summary for how their security was implemented I've talked a lot about zero tier this is how they do you know they paid an outside company to assess step by step through their code how it went and then they made the results from that company so this is not zero tier toot in your own horn this is what a security audit looks like from apparently a company called trail of bits but that's what's important you want to not only do this but have it done risk go really far to I think this is like the real standard for because they've already gone through a couple of them and I think they did a great job of transparency here's bit warden breaking down all the facets SOC2 SOC3 2020 2018 risk auditing breakdowns of everything else full link to the report here's our report that we're dumping out for you this is something that these companies could do but they would actually have to do the security test results I don't think they're doing that they're saying we do QA testing I want to see this level of transparency in your system and I think you'd be substantially better you would put us so much further ahead in confidence so it's I'm hoping and it'll be one of those domino effects once the first company does this great I think a lot of more of them will have to do it because it'll be like the gold standard in the market that you have this done that you have levels of companies going hey I don't want a company that hasn't gone through this level of transparency and pen testing and this is what we want to do so it's it's definitely a long time coming in the marketplace and it's kind of what we need in order to better trust the tools that we have because it's hard enough to set up all the stack and tools refer to beginning of video where we ranted about buying things through resellers it's even worse when those tools that we spent all this time figuring it's set up and all the pain we went through talking to sales people are then used against us because they weren't done and it's a disservice to all the people that spent time selling you the product because their jobs are in jeopardy because the product will shrink to some of the user base probably still survive as a company and come out the other side better audited now but that's now after the damage is done and a big mess was made so hopefully the market will get better for all of this that's me being wishful thinking it's Tom's rant on all of that where was the there we go put this put the chat back so what other questions there what is your liability better have a policy you definitely have liability there I'm not a lawyer talk to your lawyer talk to your insurance policy holder about your liability on it you are likely to be part of tiered lawsuits that will probably loss of business everything else there's a lot of legal stuff that's going to happen but yes you can point the finger at the other person but you're you at some level depending on how they do it you're on the hook so yes you have some liability in that huh to do do yeah from a supportive view someone and someone who works in reselling advising myself managed file transfer having this low transparency be great from our vendors yes absolutely it would be so good if they had that that's just and I'll assume that's the question you wanted answered was the legal liability you know I did break down I think I have me find it real quick legal huh I thought I did a video on this topic with Kaseya let's see and can't find it I there's a write up somewhere and that's the problem sometimes Lawrence system if I put blog on it well I find it Kaseya act legal how's that let's see if I can find that no not seeing it we do this Kaseya Lawrence systems oh I should spell Kaseya right I'm looking to make sure I figured everything else out there we go that's the July 2021 there's so many of these man I got a lot of search results here huh let's see Kaseya had ransomware that avoided devices with Russian keyboard layout yes that's true it's not that the Kaseya it's not specifically the Kaseya it's the fact that they were using soda no kibby that particular ransomware avoids rushing key layouts so that's where that comes in to play I believe and we can probably pull this up too if you're interested and this is a fun topic that let me see what's the one GRC Steve Gibson just covered this over security now and I thought it was a good good write up security now I'll find the link 826 what's his last show number is it 828 827 I think that one and he's got a chart there we go he's got a chart in here and I'm going to share this so this is a solid write up for sure so this is a breakdown this is from Security Now Episode Number 827 he does an absolute wonderful breakdown of just how well written this ransomware is and one of the things Steve points out is there are no steps in here that are extra or unused like this is a very complex ransomware it is it's shockingly well-written exempted extensions exempted files how it works how it does all the keys how it creates separate keys for every server that it does it even talks about because it's malware as a service how the campaign keys work as in yes they have a customer service so you have the our evil ransomware group then you have the affiliates and how they create all set of keys for all of them so it is it is wild how good they are at this they they have they understand the products they're attacking and the systems are attacking at a higher level than many of the people defending or even the people that are using these products so this stuff is very very in-depth so there's a but it's a great breakdown it's in his show notes or you can listen to the podcast but Steve Gibson hats off to the guy for having some of the really great detailed show notes so if you're just into reading you don't even have to listen to the podcast you could just read through it all and be able to do things what is also kind of crazy to me um this right here they're using uh 25 519 like they're using modern elliptic curve cryptography like really solid stuff here and if you're not familiar i if uh maybe i was quoting it someone can correct me on this um the celsa 20 symmetric cipher i believe that's even the same one that's currently used in wire guard so actually i'll look it up i can fact check myself on this so uh wire guard celsa 20 yes that is the same uh the reason it's used by wire guard it's a fast cipher it's a modern cipher it's quite good so um they're using the latest and greatest in cipher technology to do this this is not for um this was not written by amateurs these are people who properly implemented this is also why when people say well can't we just decode the files no please note that these are not easy to decode because this was so well written and it's not that i'm showing any respect for these people but it's to understand that you're not dealing with an average threat actor here you're dealing with a really top level threat actor to be able to do this so yeah they they aren't using just your average software this is some of the you know the threats people are up against with this so this is kind of my rant on those things of we need better security audits because this is what we're up against and while we're also up against well while we have the ransomware apparatus using the latest and elliptic curve encryption we have kaseya else if fail open log in okay i mean you can see that the um it's it's an asymmetrical warfare this is you may have a nice symmetric cipher but the the warfare is asymmetrical it was it was bound to fall to uh people that can write really good code and people that can go huh so i don't know i guess i'm not trying to just pick on kaseya they're not they're they're the latest but they're not the only there's plenty of other bad code hanging out there uh especially in the enterprise market because it just hasn't gone through rigorous testing and it's just a matter of uh time before we see more and more enterprise software cracked i think del was in the news for one of their uh enterprise offerings being cracked the other day it's it's going to be an ongoing problem it's going to take a long time for the enterprise software to really get the scrutiny it needs and get caught up until it it's not a problem so uh yes it's uh you know philosophy i'm finding bad guys don't backdoor or outlaw cryptography because you can't build a better mousetrap a lot of it comes down to security and layers disaster planning there's not there's not a key that unlocks that fixes this there's not a one step one good mousetrap because you know i i still started the conversation and i i'm curious you know what did or didn't stand up but then that fell apart because uh one of the things we tried to figure out is why and this is information that was posted in some discussions over on reddit rmsp you can follow in there and there was a lot of discussion that went back and forth about what did or didn't withstand the attack and honestly um from some of the people that were involved in the incident response are like we've seen x-product fail in one scenario and go and stop it in the next but we don't know what the difference was we can't play it back so to speak because it was the same ransomware attack but one stood up to it one didn't but honestly if you have everything in layers it's just part of the stack so as it kind of if you pictured it as a marble being dropped down where's it going to hit which layers is going to stop it well if you have a whole series of them you're better off than yes uh than just the singular uh one hopefully one defense works type attitude uh uh yes this is um the trojan uh i can't remember the name of the project but yes this was that phone that was an interesting i i i hope there's some good debriefing on it and some uh post analysis and what happens is and this is why i like dark net diaries is they cover things jack reciter covers things in depth but he also does as he he's he said historical news not news news but the way you get to historical news is from the time of an incident versus the legal proceedings the legal proceedings just you know all the lawyers are going to go back and forth there's going to be a lot of discovery there's going to be a lot of digging into information then they're going to be able to compile all that once that happens then you have court transcripts to paint a picture of what really happened in a you know timeline sense everything else when you're always looking from the outside we know that the FBI had a sting operation we know components of it but once things go to trial we'll have like a nice timeline to be able to build the picture of exactly what happened so i think it's going to be kind of a fun one uh there's yeah the FBI um anon so yes uh the north yeah the north korea one yeah there was a there was a couple odd ones they had in there but they offer a lot of uh a lot of insight so uh can the univai security gateway be used with pf sense i think it's a terrible idea i would not you you you can double nat things i just don't know why you would i can't come up with a good reason to do it it creates more headache so it's not that it's impossible to do it's just not a good idea to do so i don't don't use them both um what else was there i i'm going to give it 10 more minutes because i have an event to go to so what else do we got for me throw throw your questions we can go off on tangents now i see someone say why would you want to stack firewalls um yeah don't stack i mean there's don't stack firewalls how's that um oh my picture is of some really hot hot sauce so that's uh where we go here so i did have some juluca mustard hot sauce so that's definitely uh oh any idea why pf sense vm seemingly blocks all google services and sites uh you probably loaded pf blocker and blocked all the google stuff but that would be my assumption as to what happened so sg 1100 is the sg 1100 so good for an office about 20 ah well pf sense is not a good web content filtering platform so it may work i think it's a little underpowered for um an office but it'll work it's you're not going to get the most speed of it we usually the minimum we install in most offices is going to be like a 3100 uh 1100 just a little bit weak you know if i talk i'm not using it anytime soon i'm assuming you're talking about the phone application they're using i there's nothing about it that i think is great i missed the win win 365 i talked about a little bit in the beginning uh i there's a link to the and i tweeted out for that nerdyo has a really good write up on how it works uh so there's that on my twitter minimums i sell clients is 3100 that's kind of for us too we stock we don't always stock them but uh because they go pretty fast we try to at least keep one or two on hand uh one in case anything goes wrong for a client we have one we're at the ready because we've sold so many of them but yeah i think 3100 is a solid solution for small business uh now this is a good question when does the unify coffee maker come out what is the next market unify will pivot into and uh i don't know that that's an interesting question will they dump it again yeah i don't know yes the 6100 is delayed apparently there was a volcano eruption actually that's not true uh they tweeted out a twitter poll of what do you guys think caused it a volcano eruption or supply chain supply chain supply chain is what it is so that's um it's a problem it's a problem for sure yeah look at the 3100 it's it's we we like them they're just a good solid reliable works every time supports uh reasonably fast internet and in case they ever need vpn it's on there yes i seen the jira ticket update so awesome that's uh the true nas has finally fixed the cpu panel bug i don't even look at the cpu panel that much but still makes me happy they fixed it i mean it shouldn't have been broken but hey that happens hey thank you biker chris for the donation much appreciated still got four more minutes i can uh share screen chrome uh that's that stuff here is crazy so uh if you guys are looking for something to happen it was uh geluca uh which is like the ghost pepper mustard i can't believe how hot that is that he was uh shocked so i don't think doh uh doh to allow pia blocker if using doh you're not going to get pia blocker because you're bypassing the local dns so yeah that's not there uh the hot sauce came because of this um me and my son went and had uh tons of hot sauce i think i got we went to it's called jungle gyms and Cincinnati and just crazy amounts of hot sauce we bought lots of things you can there's just this whole area this is all rows and rows of hot sauce so we um yeah so much sauce ah what else was i uh do i've been debating about this i went um i don't know if it belongs on my tech channel or this is a separate thing but a couple people did ask me about doing a uh review on my tesla like you know a ownership review older i took it up to the smoky mountains and took it for a drive so now that i've had it for a few years and like 36 or 37 thousand miles or so on it um i don't know if it fits my channel anymore though it's like do i do one i got a lot of views last time i did it but there's a lot of people doing test reviews do i put it on my personal channel i haven't really decided the problem is i don't have any subscribers on my personal channel so nothing gets traction on there and you know if the goal of making a video is to get people to view it then you kind of want people to view it so but yeah nonetheless uh it is a piece of technology so i guess it's somewhat related that's what i did over the weekend so uh nothing's really broke but yeah i mean it's like any car that's in the 60k range prices on repairs are a little it can be a little bit high but there's a lot less to go wrong so how do you manage to find charging places on long trips um where's it at i took pictures uh everywhere you don't look for them because unless you have an electric car it's not something you look for but the superchargers you just stop takes like 20 30 minutes to charge on a supercharger and uh where you go you're you're charged up and uh ready to go again so yeah they do have they have a lot of superchargers um everywhere matter of fact if you go to tesla road trip if you type in like tesla road trip they have a site that'll do all the planning for you the car does the planning as well so yeah kyle uh here at the office had the mustard too so it's not death levels it's enjoyable we me and him were eating um ghost pepper pepperonis uh covered in that hot mustard it was a great combination but solid solid for sure i'd eat more of it uh yeah and that's just funny yes it was definitely the hot sauce in the thumbnail was both good and hot that's that's always the combination we're going for because extracts are hot but not good or like the bomb which is frequently used in the you the hot ones episodes it's just bad it's hot and it's not good at all so the new ubiquity 10 gig switch i didn't know they released a new one i have i have their 25 gig switch and i have several of their uh 10 gig switches but yeah uh nonetheless thank you all for joining smash the like button before you leave that'd be wonderful i'm gotta get going to the next thing that i have to go do today so wonderful having all of you here uh leave comments down below or head over to the forums uh matter of fact because we have our new unpaid worker bot kyle set up to automatically go through and post these videos it makes it easier if you want to comment on the video instead of here in youtube land with their crappy comment system you can comment over in the forums on this video but you know let me know your thoughts too and some of what i ranted about about the security auditing you know what do you think the solutions are i think all of us need to come together as in not the vendors because the vendors have been the failure um you know what would hold their feet to the fire is a more transparency i think that's the solution but i could be wrong um i don't know i'm just just one of the many tool users out there hoping the tools don't be get used against us again uh because that creates a lot of disaster and ruins a lot of things and that's not what we're looking for we want to see the bar of security raised not uh not exploited because else login okay all right and thanks guys see you next thursday and sometime in between i'll post some videos