A few months back, I experienced what a friend of mine and many libertarians and conservative parents say they have experienced: My teenagers started spouting leftist platitudes. Being combative and sarcastic by nature (since all Cubans are born with a sharp tongue), we all ended up angry and frustrated.

Upon subsequent calm reflection, I realized I had accomplished nothing. And so I tried another approach. To my complete surprise, there was a 180-degree turnaround in the teens’ views.

I would now like to share the tactics I used and give the following advice to those who are at wit’s end.

First, realize that it’s traditional for teenagers to contradict their parents’ opinions, which for millennia has led to mutual rancor. So, don’t get angry or sarcastic. Reacting with anger or sarcasm will only result in hardening their viewpoints instead of making their views fluid and changeable.

Begin by choosing an article, such as this onethis onethis one or this one — not all at once! — and ask their opinion.

The fact that you are asking and respect their opinion is half the battle won.

If the teens voice opposition to something that you agree with, simply state, “That’s an interesting point, but don’t you think …”

Don’t push! Even if they retain the same viewpoint, you have chipped away. In a few days, repeat the process with one or more articles.

Calling them a jackass — not a good idea.

They respect objective research and facts, much more than just opinions, so present independent studies that prove that journalists are biased, that liberal college and even faculty members discriminate against conservatives, that liberals sometimes discriminate against Asian Americans and that there are innate psychological and physical differences between genders.

If the teens are of college age, articles by journalists of the same age detailing the censorship, indoctrination and the totalitarian insanities in universities will doubtlessly interest them.

Once in a while, ask them to watch a film with you, such as The Death of Stalin, First They Killed My Father or Ninotchka. Ask their opinion. The downside is almost certainly they, in turn, will ask you to watch with them an inane teen movie which you’ll have to do. (Don’t be too critical.)

If you are one of those rare conservatives that still reads books, tell your child that you want to read The Gulag Archipelago, Who Stole Feminism? or Hollywood Traitors, but you’d like for them to read it first and tell you if it’s any good. Could they please read it first? (Obviously, you’ll have to read it, too.)

As for President Donald Trump, since there is so much propaganda against him, admit his flaws. Yes, of course he’s a flawed individual. He’s bombastic, vulgar, a streetfighter and sexist — after all, he’s a New Yorker. But it’s important not to mistake the messenger for the message, and there is no denying that he has reduced taxes, the economy has skyrocketed, illegal entries in the country have diminished, and the number of terrorist attacks by Muslims may have bottomed. Besides, the liberals love Bill Clinton — and he’s a serial rapist! He’s the Harvey Weinstein of politics.

Importantly: Laugh about Trump. Laugh about yourself. (I bought my son a card stating Trump would build a wall around his birthday cake.)

Many teens also practically live in YouTube. It is a cornucopia of wide-ranging material which you can use. You might want to start with those videos making fun of the radical left — from the amusing to the hilarious.

There are videos which will be very jarring to leftists. Some feature Hispanics and African Americans espousing conservative positions. Or check out this one by two eminent feminists.

Likewise, there are many other informative videos. Prager U and Jordan Peterson are tremendous resources on a variety of topics. The ones that demonstrate intimidation and censorship on college campuses. There are other subjects, of course, such as racism hoaxes, illegal voting, crimes by illegal immigrants or Muslims, comic book indoctrination, etc.

Obviously, I have provided too many source. You don’t need to use them all — or any of them. Tailor your use to your interaction with your teenager. It would be a mistake to overwhelm him or her.

But the point here is: Do it before it’s too late.


Armando Simón is a retired psychologist. He is the author of A Cuban from Kansas, Orlando Stories, Wichita Women and The Zapheads and Other Science-Fiction Stories. (These books can be obtained at Amazon and Lulu.)

The views and opinions expressed in this commentary are those of the author and do not reflect the official position of The Daily Caller.

Delivered by The Daily Sheeple

We encourage you to share and republish our reports, analyses, breaking news and videos (Click for details).

Contributed by Armando Simón of The Daily Caller News Foundation.

Hacker News: Most LokiBot samples in the wild are “hijacked” versions of the original malware


Hacker himself got hacked.

It turns out that most samples of the LokiBot malware being distributed in the wild are modified versions of the original sample, a security researcher has learned.

Targeting users since 2015, LokiBot is a password and cryptocoin-wallet stealer that can harvest credentials from a variety of popular web browsers, FTP, poker and email clients, as well as IT administration tools such as PuTTY.

The original LokiBot malware was developed and sold by online alias “lokistov,” a.k.a. “Carter,” on multiple underground hacking forums for up to $300, but later some other hackers on the dark web also started selling same malware for a lesser price (as low as $80).

It was believed that the source code for LokiBot was leaked which might have allowed others to compile their own versions of the stealer.

However, a researcher who goes by alias “d00rt” on Twitter found that someone made little changes (patching) in the original LokiBot sample, without having access to its source code, which let other hackers define their own custom domains for receiving the stolen data.

Hackers Are Actively Spreading “Hijacked” Versions of LokiBot


The researcher found that the C&C server location of the malware, where the stolen data should be sent, has been stored at five places in the program—four of them are encrypted using Triple DES algorithm and one using a simple XOR cipher.

The malware has a function, called “Decrypt3DESstring,” that it uses to decrypt all the encrypted strings and get the URL of the command-and-control server.

The researcher analyzed the new LokiBot samples and compared them with the old original sample, and found that Decrypt3DESstring function in new samples has been modified in a way that it always return value from the XOR-protected string, instead of Triple DES strings.

“The 3DES protected URLs are always the same in the all of the LokiBot samples of this [new] version,” the researcher said.

“In addition, those URLs are never used. Decrypt3DESstring returns a 3DES decrypted buffer. This should be the ideal behavior of this function, but as was described before, each time Decrypt3DESstring is called, it returns a decrypted url with XOR or encrypted url with XOR.”

These changes allowed anyone with a new sample of LokiBot to edit the program, using a simple HEX editor, and add their own custom URLs for receiving the stolen data.

However, it is not clear why the original malware author also stored the same C&C server URL in a string encrypted by the less secure XOR cipher, even when it was unnecessary.

A lot of different LokiBot samples currently distributed in the wild and available for sale on the underground market at a very low price have also been patched in the same way by several hackers.

Meanwhile, the original author of LokiBot has already launched its new version 2.0 and selling it online on many forums.

The decryption function was also being used to get registry values required for making the malware persistent on a system, but since after patching the decryption function only returns a URL, the new LokiBot samples fails to restart after the device reboots.

To know more technical details about the new samples, you can head on to the research paper [PDF] published by the researchers on GitHub.

%d bloggers like this: