feed03.fireside.fm Wed, 25 Feb 2026 16:58:15 -0600 Fireside (https://fireside.fm) TechSNAP https://techsnap.systems Sat, 15 Mar 2025 14:15:38 -0700 Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems. en-us © 2026 Jupiter Broadcasting episodic Systems, Network, and Administration Podcast. Jupiter Broadcasting Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems. false Jupiter Broadcasting [email protected] yes 430: All Good Things https://techsnap.systems/430 697f849c-00de-4c27-9231-6c039bb93a67 Fri, 29 May 2020 00:15:00 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting It's a storage showdown as Jim and Wes bust some performance myths about RAID and ZFS. 52:09 false It's a storage showdown as Jim and Wes bust some performance myths about RAID and ZFS.

Plus our favorite features from Fedora 32, and why Wes loves DNF.

]]>
DevOps, TechSNAP, Jupiter Broadcasting, A Cloud Guru, sysadmin podcast, Fedora, Fedora 32, Fedora Workstation, Ubuntu, Anaconda, Wayland, X11, Red Hat, CentOS, DNF, blivet, systemd, Linux, GNOME, Dash to Dock, Matthew Miller, LTS, rolling release, FUSE, OOM, EarlyOOM, ZFS, OpenZFS, DKMS, PPA, RAID, RAIDz, raid6, copy-on-write, vdev, storage, hard drive, SSD, HDD, spindle count, zpool, parity, filesystem, throughput, iops, chunk, block size, benchmarking It's a storage showdown as Jim and Wes bust some performance myths about RAID and ZFS.

Plus our favorite features from Fedora 32, and why Wes loves DNF.

Links:

]]>
It's a storage showdown as Jim and Wes bust some performance myths about RAID and ZFS.

Plus our favorite features from Fedora 32, and why Wes loves DNF.

Links:

]]>
https://fireside.fm/player/v2/sHzmXDIv+N89qFyXB ]]> Wes Payne Jim Salter
429: Curious About Caddy https://techsnap.systems/429 a30bad27-ffe4-4dd7-a499-0117167b9f4e Fri, 15 May 2020 00:15:00 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Jim and Wes take the latest release of the Caddy web server for a spin, investigate Intel's Comet Lake desktop CPUs, and explore the fight over 5G between the US Military and the FCC. 30:45 false Jim and Wes take the latest release of the Caddy web server for a spin, investigate Intel's Comet Lake desktop CPUs, and explore the fight over 5G between the US Military and the FCC.

]]>
DevOps, TechSNAP, Jupiter Broadcasting, A Cloud Guru, sysadmin podcast, Caddy, https, Let's Encrypt, Apache, NGINX, web server, internet, web, containers, Traefik, Wordpress, packaging, Debian, certbot, TLS, OCSP, security, automation, cloud, reverse proxy, Comet Lake, CPU, Intel, 14nm, 10nm, base clock rate, gigahertz wars, lithography, 5.0 GHz, single-core, Celeron, Pentium, Intel Core, i3, i5, i7, Ice Lake, hyperthreading, turbo max boost, thermal velocity boost, power management, CPU cooling, TDP, thermal design power, integrated graphics, AMD, 5G, Ligado, wireless communication, GPS, US Military, Pentagon, Defense Department, L-Band spectrum, spoofing, software-defined radio, FCC, IoT, mobile broadband, LightSquared Jim and Wes take the latest release of the Caddy web server for a spin, investigate Intel's Comet Lake desktop CPUs, and explore the fight over 5G between the US Military and the FCC.

Links:

]]>
Jim and Wes take the latest release of the Caddy web server for a spin, investigate Intel's Comet Lake desktop CPUs, and explore the fight over 5G between the US Military and the FCC.

Links:

]]>
https://fireside.fm/player/v2/sHzmXDIv+QtScwPN2 ]]> Wes Payne Jim Salter
428: RAID Reality Check https://techsnap.systems/428 5556e3df-292d-4b0b-8e25-27f071862c06 Fri, 01 May 2020 00:15:00 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting We dive deep into the world of RAID, and discuss how to choose the right topology to optimize performance and resilience. 36:00 false We dive deep into the world of RAID, and discuss how to choose the right topology to optimize performance and resilience.

Plus Cloudflare steps up its campaign to secure BGP, and why you might want to trade in cron for systemd timers.

]]>
DevOps, TechSNAP, Jupiter Broadcasting, A Cloud Guru, sysadmin podcast, EPYC, Threadripper, AMD, 7FX2, CPU, per-core performance, Intel, Threadripper, TDP, energy efficiency, RAID, md-raid, ZFS, hard disk performance, iops, hard drive, storage, Seagate, Iron Wolf, raidz, raidz2, RAID-5, RAID-6, RAID-10, ZFS, backups, fio, benchmarking, data integrity, BGP, Cloudflare, networking, RPKI, security, cryptography, route leak, routing, isbgpsafeyet, internet, systemd, systemd timers, cron, email, monitoring, We dive deep into the world of RAID, and discuss how to choose the right topology to optimize performance and resilience.

Plus Cloudflare steps up its campaign to secure BGP, and why you might want to trade in cron for systemd timers.

Links:

]]>
We dive deep into the world of RAID, and discuss how to choose the right topology to optimize performance and resilience.

Plus Cloudflare steps up its campaign to secure BGP, and why you might want to trade in cron for systemd timers.

Links:

]]>
https://fireside.fm/player/v2/sHzmXDIv+-w5hsDIq ]]> Wes Payne Jim Salter
427: Gigahertz Games https://techsnap.systems/427 809b6258-3513-4344-a965-b854e8c78fd3 Fri, 17 Apr 2020 00:15:00 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Jim finally gets his hands on an AMD Ryzen 9 laptop, some great news about Wi-Fi 6e, and our take on FreeBSD on the desktop. 51:29 false Jim finally gets his hands on an AMD Ryzen 9 laptop, some great news about Wi-Fi 6e, and our take on FreeBSD on the desktop.

Plus Intel's surprisingly overclockable laptop CPU, why you shouldn't freak out about 5G, and the incredible creativity of the Demoscene.

]]>
AMD, Ryzen 9, Asus Zephyrus G14, Intel, 10th-generation, Comet Lake, H-series, overclocking, gaming laptop, 20.04, Ubuntu, Focal Fossa, Wi-Fi, FCC, Wi-Fi 6e, Wi-Fi 6, wireless spectrum, 6Ghz, 5G, cell towers, coronavirus, COVID-19, FreeBSD, Unix, GhostBSD, GNOME, MATE, ZFS on root, BSD, PC-BSD, Void Linux, Project Trident, MOD, s3m, tracker, Demoscene, Amiga, assembly, computer graphics, Farbrausch, DevOps, TechSNAP, Jupiter Broadcasting, A Cloud Guru, sysadmin podcast Jim finally gets his hands on an AMD Ryzen 9 laptop, some great news about Wi-Fi 6e, and our take on FreeBSD on the desktop.

Plus Intel's surprisingly overclockable laptop CPU, why you shouldn't freak out about 5G, and the incredible creativity of the Demoscene.

Links:

]]>
Jim finally gets his hands on an AMD Ryzen 9 laptop, some great news about Wi-Fi 6e, and our take on FreeBSD on the desktop.

Plus Intel's surprisingly overclockable laptop CPU, why you shouldn't freak out about 5G, and the incredible creativity of the Demoscene.

Links:

]]>
https://fireside.fm/player/v2/sHzmXDIv+FQdmvoMM ]]> Wes Payne Jim Salter
426: Storage Stories https://techsnap.systems/426 658dd254-b721-4281-8415-9357e180e92b Fri, 03 Apr 2020 00:15:00 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting We take a look at Cloudflare's impressive Linux disk encryption speed-ups, and explore how zoned storage tools like dm-zoned and zonefs might help mitigate the downsides of Shingled Magnetic Recording. 31:17 false We take a look at Cloudflare's impressive Linux disk encryption speed-ups, and explore how zoned storage tools like dm-zoned and zonefs might help mitigate the downsides of Shingled Magnetic Recording.

Plus we celebrate WireGuard's inclusion in the Linux 5.6 kernel, and fight some exFAT FUD.

]]>
WireGuard, Linux 5.6, kernel module, networking, encryption, security, Ubuntu, Debian, Windows, zonefs, Zoned Storage, SMR, Shingled Magnetic Recording, SSD, NVMe, firmware, block device, dm-zoned, filesystems, device mapper, Western Digital, ZFS, RAID, Seagate, Microsoft, Samsung, Google, Andoird, Paragon Software, exFAT, FUD, open source, free software, NTFS, NTFS-3G, SMB, Samba, Cloudfare, crypto, dm-crypt, DevOps, TechSNAP, Jupiter Broadcasting, A Cloud Guru, sysadmin podcast, We take a look at Cloudflare's impressive Linux disk encryption speed-ups, and explore how zoned storage tools like dm-zoned and zonefs might help mitigate the downsides of Shingled Magnetic Recording.

Plus we celebrate WireGuard's inclusion in the Linux 5.6 kernel, and fight some exFAT FUD.

Links:

]]>
We take a look at Cloudflare's impressive Linux disk encryption speed-ups, and explore how zoned storage tools like dm-zoned and zonefs might help mitigate the downsides of Shingled Magnetic Recording.

Plus we celebrate WireGuard's inclusion in the Linux 5.6 kernel, and fight some exFAT FUD.

Links:

]]>
https://fireside.fm/player/v2/sHzmXDIv+x0c4TcYo ]]> Wes Payne Jim Salter
425: Ryzen Gets Real https://techsnap.systems/425 fc127e6a-cc96-408c-ae38-8049074a8f34 Fri, 20 Mar 2020 00:15:00 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting We take a look at AMD's upcoming line of Ryzen 4000 mobile CPUs, and share our first impressions of Ubuntu 20.04's approach to ZFS on root. 32:53 false We take a look at AMD's upcoming line of Ryzen 4000 mobile CPUs, and share our first impressions of Ubuntu 20.04's approach to ZFS on root.

Plus Let's Encrypt's certificate validation mix-up, Intel's questionable new power supply design, and more.

]]>
Let's Encrypt, Boulder, Go, HTTPS, TLS, CAA, DNS, ACME, automation, Intel, AMD, Ryzen, Ryzen 4000, laptop, mobile processors, CPU, GPU, computer hardware, gaming, integrated graphics, graphics, battery life, Lenovo, Ryzen Mobile, ATX12VO, power supply, PSU, motherboard, electronics, iXsystems, TrueNAS, FreeNAS, TrueNAS Core, ZFS, fusion pools, storage, zsys, 20.04, Ubuntu, Canonical, snapshots, APT, sanoid, DevOps, TechSNAP, Jupiter Broadcasting, A Cloud Guru, Linux Academy, sysadmin podcast, We take a look at AMD's upcoming line of Ryzen 4000 mobile CPUs, and share our first impressions of Ubuntu 20.04's approach to ZFS on root.

Plus Let's Encrypt's certificate validation mix-up, Intel's questionable new power supply design, and more.

Links:

]]>
We take a look at AMD's upcoming line of Ryzen 4000 mobile CPUs, and share our first impressions of Ubuntu 20.04's approach to ZFS on root.

Plus Let's Encrypt's certificate validation mix-up, Intel's questionable new power supply design, and more.

Links:

]]>
https://fireside.fm/player/v2/sHzmXDIv+kRCkIs3i ]]> Wes Payne Jim Salter
424: AMD Inside https://techsnap.systems/424 770823cf-5179-4132-91fb-d67d5ddd5ff4 Fri, 06 Mar 2020 00:15:00 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Cloudflare recently embarked on an epic quest to choose a CPU for its next-generation server build, so we explore the importance of requests per watt, the benefits of full memory encryption, and why AMD won. 28:19 false Cloudflare recently embarked on an epic quest to choose a CPU for its next-generation server build, so we explore the importance of requests per watt, the benefits of full memory encryption, and why AMD won.

Plus Mozilla's rollout of DNS over HTTPS has begun, a big milestone for Let's Encrypt, and more.

]]>
Performance per watt, power consumption, energy, CPU, AMD, Intel, EPYC, memory encryption, SGX, SME, TSME, TME, MKTME, security, encryption, Let's Encrypt, HTTPS, SSL, TLS, web security, DoH, DNS over HTTPS, DNS, Cloudflare, Mozilla, Firefox, kr00k, KRACK, WiFi, VPN, WPA2, ESET, wireless, Broadcom, Apple, iPhone, Microsoft Edge, Edge, Microsoft, Chrome, Google, Chromium, open source, NextDNS, DevOps, TechSNAP, Jupiter Broadcasting, A Cloud Guru, Linux Academy, sysadmin podcast, Cloudflare recently embarked on an epic quest to choose a CPU for its next-generation server build, so we explore the importance of requests per watt, the benefits of full memory encryption, and why AMD won.

Plus Mozilla's rollout of DNS over HTTPS has begun, a big milestone for Let's Encrypt, and more.

Links:

]]>
Cloudflare recently embarked on an epic quest to choose a CPU for its next-generation server build, so we explore the importance of requests per watt, the benefits of full memory encryption, and why AMD won.

Plus Mozilla's rollout of DNS over HTTPS has begun, a big milestone for Let's Encrypt, and more.

Links:

]]>
https://fireside.fm/player/v2/sHzmXDIv+6C34igbd ]]> Wes Payne Jim Salter
423: Hopeful for HAMR https://techsnap.systems/423 579b3028-f4b8-408a-ad04-ee0f8d017f78 Fri, 21 Feb 2020 18:00:00 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting We explore the potential of heat-assisted magnetic recording and get excited about a possibly persistent L2ARC. 29:36 false We explore the potential of heat-assisted magnetic recording and get excited about a possibly persistent L2ARC.

Plus Jim's journeys with Clear Linux, and why Ubuntu 18.04.4 is a maintenance release worth talking about.

]]>
Ubuntu, 18.04.4, 18.04, LTS, Linux, WiFi, hardware enablement, maintenance release, Clear Linux OS, Linux desktop, Intel, Clear Linux, benchmarks, performance, swupd, ZFS, ZFS on Linux, ZoL, MobaXterm, LRU, WSL, Windows, Microsoft, L2ARC, ARC, filesystems, cache, caching, HDD, storage, hard drives, HAMR, SMR, MAMR, Seagate, Western Digital, latency, throughput, DevOps, TechSNAP, Jupiter Broadcasting, A Cloud Guru, Linux Academy, sysadmin podcast, We explore the potential of heat-assisted magnetic recording and get excited about a possibly persistent L2ARC.

Plus Jim's journeys with Clear Linux, and why Ubuntu 18.04.4 is a maintenance release worth talking about.

Links:

]]>
We explore the potential of heat-assisted magnetic recording and get excited about a possibly persistent L2ARC.

Plus Jim's journeys with Clear Linux, and why Ubuntu 18.04.4 is a maintenance release worth talking about.

Links:

]]>
https://fireside.fm/player/v2/sHzmXDIv+5O_AGzEP ]]> Wes Payne Jim Salter
422: Multipath Musings https://techsnap.systems/422 7c9cef4d-3995-411c-9613-8e74e8156f5a Fri, 07 Feb 2020 00:15:00 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting We take a look at a few exciting features coming to Linux kernel 5.6, including the first steps to multipath TCP. 23:37 false We take a look at a few exciting features coming to Linux kernel 5.6, including the first steps to multipath TCP.

Plus the latest Intel speculative execution vulnerability, and Microsoft's troubled history with certificate renewal.

]]>
Automation, Let's Encrypt, SSL, TLS, CacheOut, Microsoft, Teams, Nagios, Monitoring, Linux, WireGuard, VPN, Edge, Edgium, browser wars, Chrome, blink, Chromium, Firefox, open standards, world wide web, Linux 5.6, Ubuntu 20.04, poly1305, Jason Donenfeld, networking, crypto, cryptography, mptcp, Multipath TCP, iOS, Apple, mobile, LTE, 5G, failover, 3GPP, Intel, speculative execution, ZombieLoad, TSX, SGX, cloud, virtualization, buffer overflow, stack smashing, stack canary, ASLR, DevOps, TechSNAP, Jupiter Broadcasting, A Cloud Guru, Linux Academy, sysadmin podcast, We take a look at a few exciting features coming to Linux kernel 5.6, including the first steps to multipath TCP.

Plus the latest Intel speculative execution vulnerability, and Microsoft's troubled history with certificate renewal.

Links:

]]>
We take a look at a few exciting features coming to Linux kernel 5.6, including the first steps to multipath TCP.

Plus the latest Intel speculative execution vulnerability, and Microsoft's troubled history with certificate renewal.

Links:

]]>
https://fireside.fm/player/v2/sHzmXDIv+by02j56x ]]> Wes Payne Jim Salter
421: Firewall Fun https://techsnap.systems/421 34f7722c-c7da-4f86-a8f9-14e67de6d899 Fri, 24 Jan 2020 00:15:00 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting We explore the latest round of Windows vulnerabilities and Jim shares his journey adding OPNsense to his firewall family. 25:09 false We explore the latest round of Windows vulnerabilities and Jim shares his journey adding OPNsense to his firewall family.

Plus a look back at Apollo-era audio that's still relevant today with the surprising story of the Quindar tones.

]]>
Windows, Windows Update, Patch Tuesday, Microsoft, cryptography, EternalBlue, crypt32.dll, CryptoAPI spoofing, RDP, RDP Gateway, RDP client, NSA, National Security Administration, patching, security, vulnerability, ECC, elliptic curve cryptography, Windows 10, certificate validation, OPNsense, pfSense, pf, BSD, iptables, Linux, Netgate, Netgear, networking, routing, security gateway, firewall appliance, x86, ARM, Unix, MITM, VPN, firewall, CVE-2020-0601, NASA, Apollo, moon, space, Quindar, Quindar Tones, phreaking, telephony, hacking, Captain Crunch whistle, 2600, nmap, Crystal Method, John Draper, DevOps, TechSNAP, Jupiter Broadcasting, A Cloud Guru, Linux Academy, sysadmin podcast, We explore the latest round of Windows vulnerabilities and Jim shares his journey adding OPNsense to his firewall family.

Plus a look back at Apollo-era audio that's still relevant today with the surprising story of the Quindar tones.

Links:

]]>
We explore the latest round of Windows vulnerabilities and Jim shares his journey adding OPNsense to his firewall family.

Plus a look back at Apollo-era audio that's still relevant today with the surprising story of the Quindar tones.

Links:

]]>
https://fireside.fm/player/v2/sHzmXDIv+WmiGWG6W ]]> Wes Payne Jim Salter
420: Choose Your Own Compiler https://techsnap.systems/420 00154604-0b9c-480c-9fe2-2fba4ed8420a Fri, 10 Jan 2020 00:15:00 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Compiling the Linux kernel with Clang has never been easier, so we explore this alternative compiler and what it brings to the ecosystem. 24:10 false Compiling the Linux kernel with Clang has never been easier, so we explore this alternative compiler and what it brings to the ecosystem.

Plus Debian's continued init system debate, and our frustrations over 5G reporting.

]]>
5G, Telephony, mobile, cell phones, LTE, 4G, wireless, broadband, South Korea, FR1, FR2, mmWave, Debian, systemd, netplan, Ubuntu, Canonical, Unity, networking, init system, systemd-networkd, Phoronix, Michael Larabel, clang, LLVM, GCC, GNU, compilers, C, systems programming, linux, linux kernel, kernel development, DevOps, TechSNAP, Jupiter Broadcasting, Compiling the Linux kernel with Clang has never been easier, so we explore this alternative compiler and what it brings to the ecosystem.

Plus Debian's continued init system debate, and our frustrations over 5G reporting.

Links:

]]>
Compiling the Linux kernel with Clang has never been easier, so we explore this alternative compiler and what it brings to the ecosystem.

Plus Debian's continued init system debate, and our frustrations over 5G reporting.

Links:

]]>
https://fireside.fm/player/v2/sHzmXDIv+15GoOUmB ]]> Wes Payne Jim Salter
419: Nebulous Networking https://techsnap.systems/419 9a06579c-89cb-4562-a2bc-09199c6790f5 Fri, 27 Dec 2019 00:15:00 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting From classifying cats to colorizing old photos we share our top tips and tools for starting your machine learning journey. Plus, learn why Nebula is our favorite new VPN technology, and how it can help simplify and secure your network. 33:33 false From classifying cats to colorizing old photos we share our top tips and tools for starting your machine learning journey. Plus, learn why Nebula is our favorite new VPN technology, and how it can help simplify and secure your network.

]]>
VPN,Nebula, Slack, Ryan Huber, WireGuard,mesh network,mesh VPN,mesh networking,networking,security,security groups,UDP, AT,NAT busting,UDP hole-punching,cloud,system administration,firewall, lighthouse, encryption, Noise Protocol Framework, cryptography, overlay network, flat network, virtual network, DeOldify,Jupyter notebook, Machine Learning, Artificial Intelligence, neural networks, Plinko, pachinko, ImageNet, GPU, Google Colab, Colab, DevOps, TechSNAP, Jupiter Broadcasting, From classifying cats to colorizing old photos we share our top tips and tools for starting your machine learning journey. Plus, learn why Nebula is our favorite new VPN technology, and how it can help simplify and secure your network.

Links:

]]>
From classifying cats to colorizing old photos we share our top tips and tools for starting your machine learning journey. Plus, learn why Nebula is our favorite new VPN technology, and how it can help simplify and secure your network.

Links:

]]>
https://fireside.fm/player/v2/sHzmXDIv+9PI69EfD ]]> Wes Payne Jim Salter
418: 5G Fundamentals https://techsnap.systems/418 2af0a57c-a88d-4aaa-9998-2b77110900c4 Fri, 13 Dec 2019 00:15:00 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting As the rollout of 5G finally arrives, we take some time to explain the fundamentals of the next generation of wireless technology. 34:03 false As the rollout of 5G finally arrives, we take some time to explain the fundamentals of the next generation of wireless technology.

Plus the surprising performance of eero's mesh Wi-Fi, some great news for WireGuard, and an update on the Librem 5.

]]>
T-Mobile, AT&T, Cellular, Mobile, LTE, mobile phones, IoT, 5G, 4G, wireless, broadband, 5G FR2, 5G FR1, point-to-point, Qualcomm, Snapdragon 865, mobile CPU, ARM, cellular modems, wireless modems, Librem 5, Purism, smartphone, freedom, libre, free software, privacy, security, Amazon, eero, mesh wifi, wifi, Wi-Fi, networking, wireless, speed test, DevOps, TechSNAP, Jupiter Broadcasting As the rollout of 5G finally arrives, we take some time to explain the fundamentals of the next generation of wireless technology.

Plus the surprising performance of eero's mesh Wi-Fi, some great news for WireGuard, and an update on the Librem 5.

Links:

]]>
As the rollout of 5G finally arrives, we take some time to explain the fundamentals of the next generation of wireless technology.

Plus the surprising performance of eero's mesh Wi-Fi, some great news for WireGuard, and an update on the Librem 5.

Links:

]]>
https://fireside.fm/player/v2/sHzmXDIv+d8O3fBTe ]]> Wes Payne Jim Salter
417: Machine Learning Magic https://techsnap.systems/417 88c620a6-0b1c-4698-aac4-ac757b632286 Fri, 29 Nov 2019 00:15:00 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting We explore the rapid adoption of machine learning, its impact on computer architecture, and how to avoid AI snake oil. 26:27 false We explore the rapid adoption of machine learning, its impact on computer architecture, and how to avoid AI snake oil.

Plus so-so SSD security, and a new wireless protocol that works best where the Wi-Fi sucks.

]]>
OFNP,wireless,wifi,On-Off Noise Power Communication,LORA,WiFi 6,Ubiquiti ,Unifi,Amplifi,Amplifi Alien,mesh wifi,router,home networking,networking,wireless,ethernet,ASUS,AiMesh,OFDMA,Orthogonal Frequency-Division Multiple Access,SmallNetBuilder,Tim Higgins,SSD,storage,IEEE,encryption,cryptography,hardware encryption,BitLocker,LUKS,DBAN,hard disk,hard drive,storage,solid state,Secure Erase,ATA,security,machine learning,AI,artificial intelligence,artificial general intelligence,training,neural network,inference,drunkard's walk,Nvidia,Tesla V100,Matrix multiplication,linear algebra,supercomputers,NPU,TPU,Google,Jeffrey Dean,CPU,GPU,Chip Design,Deep Learning,Intel AVX512,Deep Learning Boost,OpenVINO,ResNet,i9-10980XE,Arvind Narayanan,AIExpert, DevOps, TechSNAP, Jupiter Broadcasting We explore the rapid adoption of machine learning, its impact on computer architecture, and how to avoid AI snake oil.

Plus so-so SSD security, and a new wireless protocol that works best where the Wi-Fi sucks.

Links:

]]>
We explore the rapid adoption of machine learning, its impact on computer architecture, and how to avoid AI snake oil.

Plus so-so SSD security, and a new wireless protocol that works best where the Wi-Fi sucks.

Links:

]]>
https://fireside.fm/player/v2/sHzmXDIv+a49j-uob ]]> Wes Payne Jim Salter
416: I.T. Phone Home https://techsnap.systems/416 e38f2c78-c42c-4c73-b785-322cbeb33552 Fri, 15 Nov 2019 00:15:00 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Ubiquiti's troublesome new telemetry, Jim's take on the modern Microsoft, and why Project Silica just might be the future of long term storage. 27:56 false Ubiquiti's troublesome new telemetry, Jim's take on the modern Microsoft, and why Project Silica just might be the future of long term storage.

]]>
Ubiquiti,wifi,telemetry,Unifi,communication,video,unifi controller,security camera,cloud key,Microsoft,Microsoft Ignite,business,cold storage,optical storage,optical media,ZFS,parity, Project Silica, glass, The Mote in God's Eye, Superman, long term storage, archival, Linux, Microsoft Edge,Chromium,Open Source,DevOps, TechSNAP, Jupiter Broadcasting Ubiquiti's troublesome new telemetry, Jim's take on the modern Microsoft, and why Project Silica just might be the future of long term storage.

Links:

]]>
Ubiquiti's troublesome new telemetry, Jim's take on the modern Microsoft, and why Project Silica just might be the future of long term storage.

Links:

]]>
https://fireside.fm/player/v2/sHzmXDIv+gOBo5HhH ]]> Wes Payne Jim Salter
415: It's All About IOPS https://techsnap.systems/415 876a69f9-340a-4bc9-bfaa-be87b35ac4c9 Fri, 01 Nov 2019 00:15:00 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting We share our simple approach to disk benchmarking and explain why you should always test your pain points. 34:29 false We share our simple approach to disk benchmarking and explain why you should always test your pain points.

Plus the basics of solid state disks and how to evaluate which model is right for you.

]]>
Samsung evo, samsung pro, ssd, ssds, solid state disks, 4k random writes, disk benchmarking, benchmarks, phoronix test suite, spinning rust, hard disk drive, hard disk, Crucial, Sandisk, SSD Controller, queue depth, fio, IOPS, throughput, flash storage, NVMe, disk performance, dd, fsync, flexible IO tester, disk cache, ssd cache, test your pain points, rsyslogd, syslog, RAID, TLC, MLC, SLC, write endurance, TRIM, DevOps, TechSNAP, Jupiter Broadcasting We share our simple approach to disk benchmarking and explain why you should always test your pain points.

Plus the basics of solid state disks and how to evaluate which model is right for you.

Links:

]]>
We share our simple approach to disk benchmarking and explain why you should always test your pain points.

Plus the basics of solid state disks and how to evaluate which model is right for you.

Links:

]]>
https://fireside.fm/player/v2/sHzmXDIv+yDiO4sjx ]]> Wes Payne Jim Salter
414: Rooting for ZFS https://techsnap.systems/414 890ebb60-fe73-476d-bd48-1bcb93c016ba Fri, 18 Oct 2019 04:15:00 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting We dive into Ubuntu 19.10's experimental ZFS installer and share our tips for making the most of ZFS on root.  42:27 false We dive into Ubuntu 19.10's experimental ZFS installer and share our tips for making the most of ZFS on root. 

Plus why you may want to skip Nest Wifi, and our latest explorations of long range wireless protocols.

]]>
LoRa, LoRaWAN, Sigfox, amazon sidewalk, wifi, 2g, RF Chirp, spread spectrum, low bandwidth, SureFi, wireless, wireless networking, google wifi, nest wifi, mesh wifi, unifi, tp-link, zfs, copy on write, btrfs, boot environments, freebsd, zsys, Canonical, ubuntu, 19.10,5.3, snapshots, backups, data integrity, eoan, DevOps, TechSNAP, Jupiter Broadcasting We dive into Ubuntu 19.10's experimental ZFS installer and share our tips for making the most of ZFS on root. 

Plus why you may want to skip Nest Wifi, and our latest explorations of long range wireless protocols.

Links:

  • Decoding LoRa: Realizing a Modern LPWAN with SDR — LoRa is an emerging Low Power Wide Area Network (LPWAN), a type of wireless communication technology suitable for connecting low power embedded devices over long ranges. This paper details the modulation and encoding elements that comprise the LoRa PHY, the structure of which is the result of the author’s recent blind analysis of the protocol. It also introduces grlora, an open source software defined implementation of the PHY that will empower wireless developers and security researchers to investigate this nascent protocol.
  • Nest Wifi announced at Made by Google 2019 | Ars Technica — Google says that a two-piece Nest Wifi kit—one Nest Router and one Nest Point—should cover up to 3,800 square feet and 85% of homes. This claim, like most arbitrary claims of Wi-Fi coverage with no real detail, should be taken with several grains of salt.
  • TP-LINK EAP series Business Wi-Fi Solution — The EAP Series Business Wi-Fi Solution incorporates EAP Series hardware, which provides a smooth, reliable wireless internet experience, and a powerful centralized management platform.
  • Bloody Stupid Johnson | Discworld Wiki — Although evidently able in certain fields, Johnson is notorious for his complete inability to produce anything according to specification or common sense, or (sometimes) even the laws of physics.
  • A Quick Look At EXT4 vs. ZFS Performance On Ubuntu 19.10 With An NVMe SSD — For those thinking of playing with Ubuntu 19.10's new experimental ZFS desktop install option in opting for using ZFS On Linux in place of EXT4 as the root file-system, here are some quick benchmarks looking at the out-of-the-box performance of ZFS/ZoL vs. EXT4 on Ubuntu 19.10 using a common NVMe solid-state drive.
  • ubuntu/zsys: zsys daemon and client for zfs systems — It allows running multiple ZFS systems in parallel on the same machine, get automated snapshots, managing complex zfs dataset layouts separating user data from system and persistent data, and more.
  • Ubuntu ZFS support in 19.10: ZFS on root · ~DidRocks — We are shipping ZFS On Linux version 0.8.1, with features like native encryption, trimming support, checkpoints, raw encrypted zfs transmissions, project accounting and quota and a lot of performance enhancements.
  • Ubuntu ZFS support in 19.10: introduction · ~DidRocks — We want to support ZFS on root as an experimental installer option, initially for desktop, but keeping the layout extensible for server later on.
  • A detailed look at Ubuntu’s new experimental ZFS installer | Ars Technica — If you're new to the ZFS hype train, you might wonder why a new filesystem option in an OS installer is a big deal. So here's a quick explanation: ZFS is a copy-on-write filesystem, which can take atomic snapshots of entire filesystems.
]]>
We dive into Ubuntu 19.10's experimental ZFS installer and share our tips for making the most of ZFS on root. 

Plus why you may want to skip Nest Wifi, and our latest explorations of long range wireless protocols.

Links:

  • Decoding LoRa: Realizing a Modern LPWAN with SDR — LoRa is an emerging Low Power Wide Area Network (LPWAN), a type of wireless communication technology suitable for connecting low power embedded devices over long ranges. This paper details the modulation and encoding elements that comprise the LoRa PHY, the structure of which is the result of the author’s recent blind analysis of the protocol. It also introduces grlora, an open source software defined implementation of the PHY that will empower wireless developers and security researchers to investigate this nascent protocol.
  • Nest Wifi announced at Made by Google 2019 | Ars Technica — Google says that a two-piece Nest Wifi kit—one Nest Router and one Nest Point—should cover up to 3,800 square feet and 85% of homes. This claim, like most arbitrary claims of Wi-Fi coverage with no real detail, should be taken with several grains of salt.
  • TP-LINK EAP series Business Wi-Fi Solution — The EAP Series Business Wi-Fi Solution incorporates EAP Series hardware, which provides a smooth, reliable wireless internet experience, and a powerful centralized management platform.
  • Bloody Stupid Johnson | Discworld Wiki — Although evidently able in certain fields, Johnson is notorious for his complete inability to produce anything according to specification or common sense, or (sometimes) even the laws of physics.
  • A Quick Look At EXT4 vs. ZFS Performance On Ubuntu 19.10 With An NVMe SSD — For those thinking of playing with Ubuntu 19.10's new experimental ZFS desktop install option in opting for using ZFS On Linux in place of EXT4 as the root file-system, here are some quick benchmarks looking at the out-of-the-box performance of ZFS/ZoL vs. EXT4 on Ubuntu 19.10 using a common NVMe solid-state drive.
  • ubuntu/zsys: zsys daemon and client for zfs systems — It allows running multiple ZFS systems in parallel on the same machine, get automated snapshots, managing complex zfs dataset layouts separating user data from system and persistent data, and more.
  • Ubuntu ZFS support in 19.10: ZFS on root · ~DidRocks — We are shipping ZFS On Linux version 0.8.1, with features like native encryption, trimming support, checkpoints, raw encrypted zfs transmissions, project accounting and quota and a lot of performance enhancements.
  • Ubuntu ZFS support in 19.10: introduction · ~DidRocks — We want to support ZFS on root as an experimental installer option, initially for desktop, but keeping the layout extensible for server later on.
  • A detailed look at Ubuntu’s new experimental ZFS installer | Ars Technica — If you're new to the ZFS hype train, you might wonder why a new filesystem option in an OS installer is a big deal. So here's a quick explanation: ZFS is a copy-on-write filesystem, which can take atomic snapshots of entire filesystems.
]]>
https://fireside.fm/player/v2/sHzmXDIv+C37cIGM- ]]> Wes Payne Jim Salter
413: The Coffee Shop Problem https://techsnap.systems/413 2c022259-3aec-490f-b2e3-0560336bafce Fri, 04 Oct 2019 00:15:00 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting We peer into the future with a quick look at quantum supremacy, debate the latest DNS over HTTPS drama, and jump through the hoops of HTTP/3. 32:05 false We peer into the future with a quick look at quantum supremacy, debate the latest DNS over HTTPS drama, and jump through the hoops of HTTP/3.

Plus when to use WARP, the secrets of Startpage, and the latest Ryzen release.

]]>
DoH, DNS, HTTPS, TLS, SSL, DNS-over-HTTPS, Google, Mozilla, Firefox, Cloudflare, encryption, Windows, Chrome, MITM, Man-In-The-Middle, Quad-9, 1.1.1.1, 8.8.8.8, Cloudflare DNS, Google DNS, Wireguard, Wireguard VPN, VPN, WARP, privacy, anonymity, region shifting, mmproxy, tcp, tcp/ip, ip, forwarding, proxy, iptables, HTTP/3, QUIC, udp, 0-RTT, SPDY, networking, network protocol, curl, quiche, rust, chrome canary, canary, startpage, duckduckgo, google search, search engines, cookies, incognito, startmail, web proxy, Chromebook, chromebook support, lenovo, lenovo chromebook, security updates, Quantum computing, quantum computers, quantum supremacy, shor's algorithm, cryptography, public-key cryptography, AMD, AMD Ryzen, Ryzen PRO, Ryzen PRO 3000, memory encryption, devops, sysadmin podcast, jupiter broadcasting, linux academy, techsnap, guardmi We peer into the future with a quick look at quantum supremacy, debate the latest DNS over HTTPS drama, and jump through the hoops of HTTP/3.

Plus when to use WARP, the secrets of Startpage, and the latest Ryzen release.

Links:

]]>
We peer into the future with a quick look at quantum supremacy, debate the latest DNS over HTTPS drama, and jump through the hoops of HTTP/3.

Plus when to use WARP, the secrets of Startpage, and the latest Ryzen release.

Links:

]]>
https://fireside.fm/player/v2/sHzmXDIv+Zxuov-K3 ]]> Wes Payne Jim Salter
412: Too Good To Be True https://techsnap.systems/412 d6b4d1e4-a600-45ff-bad6-5d1cd032a4af Fri, 20 Sep 2019 00:15:00 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting It's TechSNAP story time as we head out into the field with Jim and put Sure-Fi technology to the test. 34:36 false It's TechSNAP story time as we head out into the field with Jim and put Sure-Fi technology to the test.

Plus an update on Wifi 6, an enlightening Chromebook bug, and some not-quite-quantum key distribution.

]]>
QKD, Quantum key distribution, quantum cryptography, cryptography, security, Chromebooks, ChromeOS, Neverware, CloudreadyOS, google, security updates, 802.11ax, Wifi 5, Wifi 6, WPA3, Wifi, wireless, Sure-Fi, RF Chrip, spread spectrum, industrial iot, iot, the wifi challenge, sysadmin podcast, HVAC, networking, ethernet, low bandwidth, DevOps, TechSNAP, Jupiter Broadcasting It's TechSNAP story time as we head out into the field with Jim and put Sure-Fi technology to the test.

Plus an update on Wifi 6, an enlightening Chromebook bug, and some not-quite-quantum key distribution.

Links:

]]>
It's TechSNAP story time as we head out into the field with Jim and put Sure-Fi technology to the test.

Plus an update on Wifi 6, an enlightening Chromebook bug, and some not-quite-quantum key distribution.

Links:

]]>
https://fireside.fm/player/v2/sHzmXDIv+1HOtfKY8 ]]> Wes Payne Jim Salter
411: Mobile Security Mistakes https://techsnap.systems/411 b9fd8f0e-82a3-44bb-b373-eea0ac62412d Fri, 06 Sep 2019 00:15:00 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting We take a look at a few recent zero-day vulnerabilities for iOS and Android and find targeted attacks, bad assumptions, and changing markets. 29:38 false We take a look at a few recent zero-day vulnerabilities for iOS and Android and find targeted attacks, bad assumptions, and changing markets.

Plus what to expect from USB4 and an upcoming Linux scheduler speed-up for AMD's Epyc CPUs.

]]>
iOS, iPhone, mobile, mobile apps, app security, Apple, jailbreak, security, mobile security, exploit chain, zeroday, project zero, google, libxpc, IPC, webkit, malware, android, v4l2, video4linux, privilege escalation, AMD, Epyc, NUMA, benchmarks, exploit market, Zerodium, cpu load balancing, linux, open source, USB, USB4, USB-C, Thunderbolt, USB Power Delivery, sysadmin podcast, DevOps, TechSNAP, jupiter broadcasting We take a look at a few recent zero-day vulnerabilities for iOS and Android and find targeted attacks, bad assumptions, and changing markets.

Plus what to expect from USB4 and an upcoming Linux scheduler speed-up for AMD's Epyc CPUs.

Links:

  • Google says hackers have put ‘monitoring implants’ in iPhones for years | Technology | The Guardian — Their location was uploaded every minute; their device’s keychain, containing all their passwords, was uploaded, as were their chat histories on popular apps including WhatsApp, Telegram and iMessage, their address book, and their Gmail database.
  • Project Zero: A very deep dive into iOS Exploit chains found in the wild — We discovered exploits for a total of fourteen vulnerabilities across the five exploit chains: seven for the iPhone’s web browser, five for the kernel and two separate sandbox escapes.
  • Project Zero: In-the-wild iOS Exploit Chain 1 — This exploit provides evidence that these exploit chains were likely written contemporaneously with their supported iOS versions; that is, the exploit techniques which were used suggest that this exploit was written around the time of iOS 10. This suggests that this group had a capability against a fully patched iPhone for at least two years.  
  • Project Zero: In-the-wild iOS Exploit Chain 3 — It’s difficult to understand how this error could be introduced into a core IPC library that shipped to end users. While errors are common in software development, a serious one like this should have quickly been found by a unit test, code review or even fuzzing.
  • Project Zero: JSC Exploits — In this post, we will take a look at the WebKit exploits used to gain an initial foothold onto the iOS device and stage the privilege escalation exploits. All exploits here achieve shellcode execution inside the sandboxed renderer process (WebContent) on iOS.
  • Project Zero: Implant Teardown — There is no visual indicator on the device that the implant is running. There's no way for a user on iOS to view a process listing, so the implant binary makes no attempt to hide its execution from the system. The implant is primarily focused on stealing files and uploading live location data. The implant requests commands from a command and control server every 60 seconds.The implant has access to all the database files (on the victim’s phone) used by popular end-to-end encryption apps like Whatsapp, Telegram and iMessage.
  • iPhone Hackers Caught By Google Also Targeted Android And Microsoft Windows, Say Sources — Multiple sources with knowledge of the situation said that Google’s own Android operating system and Microsoft Windows PCs were also targeted in a campaign that sought to infect the computers and smartphones of the Uighur ethnic group in China.
  • Google's Shocking Decision To Ignore A Critical Android Vulnerability In Latest Security Update — Despite immediately acknowledging the vulnerability and confirming in June that it will be fixed, Google had not provided an estimated time frame for the patch.
  • Android Zero-Day Bug Opens Door to Privilege Escalation Attack, Researchers Warn | Threatpost — “In the unlikely event an attacker succeeds in exploiting this bug, they would effectively have complete control over the target device,” he told Threatpost. Once an attacker obtains escalated privileges, “it means they could completely take over a device if they can convince a user to install and run their application,”
  • Why 'Zero Day' Android Hacking Now Costs More Than iOS Attacks | WIRED — "During the last few months, we have observed an increase in the number of iOS exploits, mostly Safari and iMessage chains, being developed and sold by researchers from all around the world. The zero-day market is so flooded by iOS exploits that we've recently started refusing some them"
  • Linux 5.4 Kernel To Bring Improved Load Balancing On AMD EPYC Servers — The scheduler topology improvement by SUSE's Matt Fleming changes the behavior as currently it turns out for EPYC hardware the kernel has failed to properly load balance across NUMA nodes on different sockets.
  • USB4 is coming soon and will (mostly) unify USB and Thunderbolt | Ars Technica — The USB Implementers Forum published the official USB4 protocol specification. If your initial reaction was "oh no, not again," don't worry—the new spec is backward-compatible with USB 2 and USB 3, and it uses the same USB Type-C connectors that modern USB 3 devices do.
]]>
We take a look at a few recent zero-day vulnerabilities for iOS and Android and find targeted attacks, bad assumptions, and changing markets.

Plus what to expect from USB4 and an upcoming Linux scheduler speed-up for AMD's Epyc CPUs.

Links:

  • Google says hackers have put ‘monitoring implants’ in iPhones for years | Technology | The Guardian — Their location was uploaded every minute; their device’s keychain, containing all their passwords, was uploaded, as were their chat histories on popular apps including WhatsApp, Telegram and iMessage, their address book, and their Gmail database.
  • Project Zero: A very deep dive into iOS Exploit chains found in the wild — We discovered exploits for a total of fourteen vulnerabilities across the five exploit chains: seven for the iPhone’s web browser, five for the kernel and two separate sandbox escapes.
  • Project Zero: In-the-wild iOS Exploit Chain 1 — This exploit provides evidence that these exploit chains were likely written contemporaneously with their supported iOS versions; that is, the exploit techniques which were used suggest that this exploit was written around the time of iOS 10. This suggests that this group had a capability against a fully patched iPhone for at least two years.  
  • Project Zero: In-the-wild iOS Exploit Chain 3 — It’s difficult to understand how this error could be introduced into a core IPC library that shipped to end users. While errors are common in software development, a serious one like this should have quickly been found by a unit test, code review or even fuzzing.
  • Project Zero: JSC Exploits — In this post, we will take a look at the WebKit exploits used to gain an initial foothold onto the iOS device and stage the privilege escalation exploits. All exploits here achieve shellcode execution inside the sandboxed renderer process (WebContent) on iOS.
  • Project Zero: Implant Teardown — There is no visual indicator on the device that the implant is running. There's no way for a user on iOS to view a process listing, so the implant binary makes no attempt to hide its execution from the system. The implant is primarily focused on stealing files and uploading live location data. The implant requests commands from a command and control server every 60 seconds.The implant has access to all the database files (on the victim’s phone) used by popular end-to-end encryption apps like Whatsapp, Telegram and iMessage.
  • iPhone Hackers Caught By Google Also Targeted Android And Microsoft Windows, Say Sources — Multiple sources with knowledge of the situation said that Google’s own Android operating system and Microsoft Windows PCs were also targeted in a campaign that sought to infect the computers and smartphones of the Uighur ethnic group in China.
  • Google's Shocking Decision To Ignore A Critical Android Vulnerability In Latest Security Update — Despite immediately acknowledging the vulnerability and confirming in June that it will be fixed, Google had not provided an estimated time frame for the patch.
  • Android Zero-Day Bug Opens Door to Privilege Escalation Attack, Researchers Warn | Threatpost — “In the unlikely event an attacker succeeds in exploiting this bug, they would effectively have complete control over the target device,” he told Threatpost. Once an attacker obtains escalated privileges, “it means they could completely take over a device if they can convince a user to install and run their application,”
  • Why 'Zero Day' Android Hacking Now Costs More Than iOS Attacks | WIRED — "During the last few months, we have observed an increase in the number of iOS exploits, mostly Safari and iMessage chains, being developed and sold by researchers from all around the world. The zero-day market is so flooded by iOS exploits that we've recently started refusing some them"
  • Linux 5.4 Kernel To Bring Improved Load Balancing On AMD EPYC Servers — The scheduler topology improvement by SUSE's Matt Fleming changes the behavior as currently it turns out for EPYC hardware the kernel has failed to properly load balance across NUMA nodes on different sockets.
  • USB4 is coming soon and will (mostly) unify USB and Thunderbolt | Ars Technica — The USB Implementers Forum published the official USB4 protocol specification. If your initial reaction was "oh no, not again," don't worry—the new spec is backward-compatible with USB 2 and USB 3, and it uses the same USB Type-C connectors that modern USB 3 devices do.
]]>
https://fireside.fm/player/v2/sHzmXDIv+3t6myLyA ]]> Wes Payne Jim Salter
410: Epyc Encryption https://techsnap.systems/410 31d2ecad-fd20-405f-bbbe-e2e6bc566e0c Fri, 23 Aug 2019 00:00:00 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting It's CPU release season and we get excited about AMD's new line of server chips. Plus our take on AMD's approach to memory encryption, and our struggle to make sense of Intel's Comet Lake line. 50:07 false It's CPU release season and we get excited about AMD's new line of server chips. Plus our take on AMD's approach to memory encryption, and our struggle to make sense of Intel's Comet Lake line.

Also, a few Windows worms you should know about, the end of the road for EV certs, and an embarrassing new Bluetooth attack.

]]>
AMD, AMD rome, amd epyc, CPU, intel, comet lake, ice lake, cpu benchmarks, SGX, SEV, SEM, security, encryption, virtualization, memory encryption, intel me, amd psp, windows, text services framework, ctftool security, bluekeep, rdp, vulnerabilities, worms, bluetooth, entropy, bruteforce, KNOB, knob attack, https, ssl, tls, ev certs, extended validation, ssl certifications, certificate lifespace, sysadmin podcast, DevOps, TechSNAP, jupiter broadcasting It's CPU release season and we get excited about AMD's new line of server chips. Plus our take on AMD's approach to memory encryption, and our struggle to make sense of Intel's Comet Lake line.

Also, a few Windows worms you should know about, the end of the road for EV certs, and an embarrassing new Bluetooth attack.

Links:

  • A detailed look at AMD’s new Epyc “Rome” 7nm server CPUs | Ars Technica — The short version of the story is, Epyc "Rome" is to the server what Ryzen 3000 was to the desktop—bringing significantly improved IPC, more cores, and better thermal efficiency than either its current-generation Intel equivalents or its first-generation Epyc predecessors.
  • AMD Rome Second Generation EPYC Review: 2x 64-core Benchmarked — Ever since the Opteron days, AMD's market share has been rounded to zero percent, and with its first generation of EPYC processors using its new Zen microarchitecture, that number skipped up a small handful of points, but everyone has been waiting with bated breath for the second swing at the ball. AMD's Rome platform solves the concerns that first gen Naples had, plus this CPU family is designed to do many things: a new CPU microarchitecture on 7nm, offer up to 64 cores, offer 128 lanes of PCIe 4.0, offer 8 memory channels, and offer a unified memory architecture based on chiplets.
  • AMD EPYC Rome Still Conquering Cascadelake Even Without Mitigations - Phoronix — Out of curiosity, I've run some unmitigated benchmarks for the various relevant CPU speculative execution vulnerabilities on both the Intel Xeon Platinum 8280 Cascadelake and AMD EPYC 7742 Rome processors for seeing how the performance differs.
  • Intel’s line of notebook CPUs gets more confusing with 14nm Comet Lake | Ars Technica — Going by Intel's numbers, Comet Lake looks like a competent upgrade to its predecessor Whiskey Lake. The interesting question—and one largely left unanswered by Intel—is why the company has decided to launch a new line of 14nm notebook CPUs less than a month after launching Ice Lake, its first 10nm notebook CPUs.
  • A look at the Windows 10 exploit Google Zero disclosed this week | Ars Technica — On Tuesday, Tavis Ormandy of Google's Project Zero released an exploit kit called ctftool, which uses and abuses Microsoft's Text Services Framework in ways that can effectively get anyone root—er, system that is—on any unpatched Windows 10 system they're able to log in to
  • Patch new wormable vulnerabilities in Remote Desktop Services (CVE-2019-1181/1182) – Microsoft Security Response Center — Today Microsoft released a set of fixes for Remote Desktop Services that include two critical Remote Code Execution (RCE) vulnerabilities, CVE-2019-1181 and CVE-2019-1182. Like the previously-fixed ‘BlueKeep’ vulnerability (CVE-2019-0708), these two vulnerabilities are also ‘wormable’, meaning that any future malware that exploits these could propagate from vulnerable computer to vulnerable computer without user interaction.
  • KNOB Attack — TL;DR: The specification of Bluetooth includes an encryption key negotiation protocol that allows to negotiate encryption keys with 1 Byte of entropy without protecting the integrity of the negotiation process. A remote attacker can manipulate the entropy negotiation to let any standard compliant Bluetooth device negotiate encryption keys with 1 byte of entropy and then brute force the low entropy keys in real time.
  • Troy Hunt: Extended Validation Certificates are (Really, Really) Dead — With both browsers auto-updating for most people, we're about 10 weeks out from no more EV and the vast majority of web users no longer seeing something they didn't even know was there to begin with! Oh sure, you can still drill down into the certificate and see the entity name, but who's really going to do that? You and I, perhaps, but we're not exactly in the meat of the browser demographics.
  • Google wants to reduce lifespan for HTTPS certificates to one year | ZDNet — Scott Helme argues that the security benefits of shorter SSL certificate lifespans have nothing to do with phishing or malware sites, but instead with the SSL certificate revocation process. Helme claims that this process is broken and that bad SSL certificates continue to live on for years after being mississued and revoked.
]]>
It's CPU release season and we get excited about AMD's new line of server chips. Plus our take on AMD's approach to memory encryption, and our struggle to make sense of Intel's Comet Lake line.

Also, a few Windows worms you should know about, the end of the road for EV certs, and an embarrassing new Bluetooth attack.

Links:

  • A detailed look at AMD’s new Epyc “Rome” 7nm server CPUs | Ars Technica — The short version of the story is, Epyc "Rome" is to the server what Ryzen 3000 was to the desktop—bringing significantly improved IPC, more cores, and better thermal efficiency than either its current-generation Intel equivalents or its first-generation Epyc predecessors.
  • AMD Rome Second Generation EPYC Review: 2x 64-core Benchmarked — Ever since the Opteron days, AMD's market share has been rounded to zero percent, and with its first generation of EPYC processors using its new Zen microarchitecture, that number skipped up a small handful of points, but everyone has been waiting with bated breath for the second swing at the ball. AMD's Rome platform solves the concerns that first gen Naples had, plus this CPU family is designed to do many things: a new CPU microarchitecture on 7nm, offer up to 64 cores, offer 128 lanes of PCIe 4.0, offer 8 memory channels, and offer a unified memory architecture based on chiplets.
  • AMD EPYC Rome Still Conquering Cascadelake Even Without Mitigations - Phoronix — Out of curiosity, I've run some unmitigated benchmarks for the various relevant CPU speculative execution vulnerabilities on both the Intel Xeon Platinum 8280 Cascadelake and AMD EPYC 7742 Rome processors for seeing how the performance differs.
  • Intel’s line of notebook CPUs gets more confusing with 14nm Comet Lake | Ars Technica — Going by Intel's numbers, Comet Lake looks like a competent upgrade to its predecessor Whiskey Lake. The interesting question—and one largely left unanswered by Intel—is why the company has decided to launch a new line of 14nm notebook CPUs less than a month after launching Ice Lake, its first 10nm notebook CPUs.
  • A look at the Windows 10 exploit Google Zero disclosed this week | Ars Technica — On Tuesday, Tavis Ormandy of Google's Project Zero released an exploit kit called ctftool, which uses and abuses Microsoft's Text Services Framework in ways that can effectively get anyone root—er, system that is—on any unpatched Windows 10 system they're able to log in to
  • Patch new wormable vulnerabilities in Remote Desktop Services (CVE-2019-1181/1182) – Microsoft Security Response Center — Today Microsoft released a set of fixes for Remote Desktop Services that include two critical Remote Code Execution (RCE) vulnerabilities, CVE-2019-1181 and CVE-2019-1182. Like the previously-fixed ‘BlueKeep’ vulnerability (CVE-2019-0708), these two vulnerabilities are also ‘wormable’, meaning that any future malware that exploits these could propagate from vulnerable computer to vulnerable computer without user interaction.
  • KNOB Attack — TL;DR: The specification of Bluetooth includes an encryption key negotiation protocol that allows to negotiate encryption keys with 1 Byte of entropy without protecting the integrity of the negotiation process. A remote attacker can manipulate the entropy negotiation to let any standard compliant Bluetooth device negotiate encryption keys with 1 byte of entropy and then brute force the low entropy keys in real time.
  • Troy Hunt: Extended Validation Certificates are (Really, Really) Dead — With both browsers auto-updating for most people, we're about 10 weeks out from no more EV and the vast majority of web users no longer seeing something they didn't even know was there to begin with! Oh sure, you can still drill down into the certificate and see the entity name, but who's really going to do that? You and I, perhaps, but we're not exactly in the meat of the browser demographics.
  • Google wants to reduce lifespan for HTTPS certificates to one year | ZDNet — Scott Helme argues that the security benefits of shorter SSL certificate lifespans have nothing to do with phishing or malware sites, but instead with the SSL certificate revocation process. Helme claims that this process is broken and that bad SSL certificates continue to live on for years after being mississued and revoked.
]]>
https://fireside.fm/player/v2/sHzmXDIv+nprmonGz ]]> Wes Payne Jim Salter
409: Privacy Perspectives https://techsnap.systems/409 fb83ed86-b76d-4837-ac24-17ceb1f787aa Fri, 09 Aug 2019 00:15:00 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting We examine why it's so difficult to protect your privacy online and discuss browser fingerprinting, when to use a VPN, and the limits of private browsing. 39:14 false We examine why it's so difficult to protect your privacy online and discuss browser fingerprinting, when to use a VPN, and the limits of private browsing.

Plus Apple's blaring bluetooth beacons and Facebook's worrying plans for WhatsApp.

]]>
Privacy, privacy badger, ghostery, incognito, private browsing, canvas, webgl, VPN, wireguard, openvpn, browser fingerprinting, panopticlick, amiunique, apple, bluetooth, bluetooth le, bleee, mozilla, firefox, chrome, google, ad-blocking, advertising, adblock plus, ublock, ublock origin, facebook, WhatsApp, encryption, encryption debate, iphone, iOS, security, sysadmin podcast, DevOps, TechSNAP, jupiter broadcasting We examine why it's so difficult to protect your privacy online and discuss browser fingerprinting, when to use a VPN, and the limits of private browsing.

Plus Apple's blaring bluetooth beacons and Facebook's worrying plans for WhatsApp.

Links:

  • Apple bleee. Everyone knows What Happens on Your iPhone – hexway — If Bluetooth is ON on your Apple device everyone nearby can understand current status of your device, get info about battery, device name, Wi-Fi status, buffer availability, OS version and even get your mobile phone number
  • Facebook Plans on Backdooring WhatsApp - Schneier on Security — In Facebook's vision, the actual end-to-end encryption client itself such as WhatsApp will include embedded content moderation and blacklist filtering algorithms. These algorithms will be continually updated from a central cloud service, but will run locally on the user's device, scanning each cleartext message before it is sent and each encrypted message after it is decrypted.
  • Signal — Privacy that fits in your pocket.
  • xkcd: Security — Turns out it's a $5 wrench, even better!
  • Jim Salter on Twitter — I wonder why #privacy wonks aren't talking about browser fingerprinting more frequently? Privacy Badger, Ghostery, etc don't do a damn thing to prevent or mitigate Canvas / WebGL #fingerprinting.
  • Browser Fingerprinting: What Is It and What Should You Do About It? - PixelPrivacy — Browser fingerprinting is a powerful method that websites use to collect information about your browser type and version, as well as your operating system, active plugins, timezone, language, screen resolution and various other active settings.
  • Canvas Fingerprinting - BrowserLeaks.com — The technique is based on the fact that the same canvas image may be rendered differently in different computers. This happens for several reasons. At the image format level – web browsers uses different image processing engines, image export options, compression level, the final images may got different checksum even if they are pixel-identical. At the system level – operating systems have different fonts, they use different algorithms and settings for anti-aliasing and sub-pixel rendering.
  • WebGL Browser Report - WebGL Fingerprinting - WebGL 2 Test - BrowserLeaks.com — WebGL Browser Report checks WebGL support in your web browser, produce WebGL Device Fingerprinting, and shows the other WebGL and GPU capabilities more or less related web browser identity.
  • AmIUnique — Device fingerprinting or browser fingerprinting is the systematic collection of information about a remote device, for identification purposes. Client-side scripting languages allow the development of procedures to collect very rich fingerprints: browser and operating system type and version, screen resolution, architecture type, lists of fonts, plugins, microphone, camera, etc.
  • Panopticlick — Panopticlick will analyze how well your browser and add-ons protect you against online tracking techniques. We’ll also see if your system is uniquely configured—and thus identifiable—even if you are using privacy-protective software. However, we only do so with your explicit consent, through the TEST ME button below.
  • How private is your browser’s Private mode? Research into porn suggests “not very” | Ars Technica — This leaves browser fingerprinting as a method to tie your profiles together—and unfortunately, Incognito mode doesn't appear to help.
  • Privacy Tools - Encryption Against Global Mass Surveillance — You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. privacytools.io provides services, tools and knowledge to protect your privacy against global mass surveillance.
  • ‘Fingerprinting’ to Track Us Online Is on the Rise. Here’s What to Do. - The New York Times — Fingerprinting involves looking at the many characteristics of your mobile device or computer, like the screen resolution, operating system and model, and triangulating this information to pinpoint and follow you as you browse the web and use apps. Once enough device characteristics are known, the theory goes, the data can be assembled into a profile that helps identify you the way a fingerprint would.
  • Digital 'Fingerprinting' Is The Next Generation Tracking Technology | The Takeaway | WNYC Studios — This growing technology is almost invisible, making it impossible for users to opt-out of the tracking system. As it becomes more popular, tech companies are developing new ways to try and protect consumers from this form of tracking. But is it going to work?
  • New Warning Issued Over Google's Chrome Ad-Blocking Plans — The plans, dubbed Manifest V3, represent a major transformation to Chrome extensions including a revamp of the permissions system. As a result, modern ad blockers such as uBlock Origin—which uses Chrome’s webRequest API to block ads before they’re downloaded–won’t work.
  • Comment on Chrome extension manifest v3 proposal by gorhill — The blocking ability of the webRequest API is still deprecated, and Google Chrome's limited matching algorithm will be the only one possible, and with limits dictated by Google employees. It's annoying that they keep saying "the webRequest API is not deprecated" as if developers have been worried about this -- and as if they want to drown the real issue in a fabricated one nobody made.
  • CanvasBlocker
  • Ghostery
  • Disconnect
]]>
We examine why it's so difficult to protect your privacy online and discuss browser fingerprinting, when to use a VPN, and the limits of private browsing.

Plus Apple's blaring bluetooth beacons and Facebook's worrying plans for WhatsApp.

Links:

  • Apple bleee. Everyone knows What Happens on Your iPhone – hexway — If Bluetooth is ON on your Apple device everyone nearby can understand current status of your device, get info about battery, device name, Wi-Fi status, buffer availability, OS version and even get your mobile phone number
  • Facebook Plans on Backdooring WhatsApp - Schneier on Security — In Facebook's vision, the actual end-to-end encryption client itself such as WhatsApp will include embedded content moderation and blacklist filtering algorithms. These algorithms will be continually updated from a central cloud service, but will run locally on the user's device, scanning each cleartext message before it is sent and each encrypted message after it is decrypted.
  • Signal — Privacy that fits in your pocket.
  • xkcd: Security — Turns out it's a $5 wrench, even better!
  • Jim Salter on Twitter — I wonder why #privacy wonks aren't talking about browser fingerprinting more frequently? Privacy Badger, Ghostery, etc don't do a damn thing to prevent or mitigate Canvas / WebGL #fingerprinting.
  • Browser Fingerprinting: What Is It and What Should You Do About It? - PixelPrivacy — Browser fingerprinting is a powerful method that websites use to collect information about your browser type and version, as well as your operating system, active plugins, timezone, language, screen resolution and various other active settings.
  • Canvas Fingerprinting - BrowserLeaks.com — The technique is based on the fact that the same canvas image may be rendered differently in different computers. This happens for several reasons. At the image format level – web browsers uses different image processing engines, image export options, compression level, the final images may got different checksum even if they are pixel-identical. At the system level – operating systems have different fonts, they use different algorithms and settings for anti-aliasing and sub-pixel rendering.
  • WebGL Browser Report - WebGL Fingerprinting - WebGL 2 Test - BrowserLeaks.com — WebGL Browser Report checks WebGL support in your web browser, produce WebGL Device Fingerprinting, and shows the other WebGL and GPU capabilities more or less related web browser identity.
  • AmIUnique — Device fingerprinting or browser fingerprinting is the systematic collection of information about a remote device, for identification purposes. Client-side scripting languages allow the development of procedures to collect very rich fingerprints: browser and operating system type and version, screen resolution, architecture type, lists of fonts, plugins, microphone, camera, etc.
  • Panopticlick — Panopticlick will analyze how well your browser and add-ons protect you against online tracking techniques. We’ll also see if your system is uniquely configured—and thus identifiable—even if you are using privacy-protective software. However, we only do so with your explicit consent, through the TEST ME button below.
  • How private is your browser’s Private mode? Research into porn suggests “not very” | Ars Technica — This leaves browser fingerprinting as a method to tie your profiles together—and unfortunately, Incognito mode doesn't appear to help.
  • Privacy Tools - Encryption Against Global Mass Surveillance — You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. privacytools.io provides services, tools and knowledge to protect your privacy against global mass surveillance.
  • ‘Fingerprinting’ to Track Us Online Is on the Rise. Here’s What to Do. - The New York Times — Fingerprinting involves looking at the many characteristics of your mobile device or computer, like the screen resolution, operating system and model, and triangulating this information to pinpoint and follow you as you browse the web and use apps. Once enough device characteristics are known, the theory goes, the data can be assembled into a profile that helps identify you the way a fingerprint would.
  • Digital 'Fingerprinting' Is The Next Generation Tracking Technology | The Takeaway | WNYC Studios — This growing technology is almost invisible, making it impossible for users to opt-out of the tracking system. As it becomes more popular, tech companies are developing new ways to try and protect consumers from this form of tracking. But is it going to work?
  • New Warning Issued Over Google's Chrome Ad-Blocking Plans — The plans, dubbed Manifest V3, represent a major transformation to Chrome extensions including a revamp of the permissions system. As a result, modern ad blockers such as uBlock Origin—which uses Chrome’s webRequest API to block ads before they’re downloaded–won’t work.
  • Comment on Chrome extension manifest v3 proposal by gorhill — The blocking ability of the webRequest API is still deprecated, and Google Chrome's limited matching algorithm will be the only one possible, and with limits dictated by Google employees. It's annoying that they keep saying "the webRequest API is not deprecated" as if developers have been worried about this -- and as if they want to drown the real issue in a fabricated one nobody made.
  • CanvasBlocker
  • Ghostery
  • Disconnect
]]>
https://fireside.fm/player/v2/sHzmXDIv+irctYUsc ]]> Wes Payne Jim Salter
408: Apollo's ARC https://techsnap.systems/408 2577b50c-e740-46c8-a75b-14f074cb812a Fri, 26 Jul 2019 00:15:00 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting We take a look at the amazing abilities of the Apollo Guidance Computer and Jim breaks down everything you need to know about the ZFS ARC. 35:13 false We take a look at the amazing abilities of the Apollo Guidance Computer and Jim breaks down everything you need to know about the ZFS ARC.

Plus an update on ZoL SIMD acceleration, your feedback, and an interesting new neuromorphic system from Intel.

]]>
virtualization, openzfs, zfs, kvm, qemu, vhd, qcow, qcow2, ARC, memory, page cache, caching, ZFS on Linux, ZoL, SIMD, floating point, fpu, apollo, apollo anniversary, nasa, retro computing, magnetic core, core rope, AGC, apollo guidance computer, intel, dancing demon, kernel module, loihi, neuromorphic computing, text adventure, punch cards, Margaret Hamilton, neural networks, machine learning, ai, pohoiki, snapshots, sysadmin, trs-80, cloud, Chris Siebenmann, DevOps, TechSNAP We take a look at the amazing abilities of the Apollo Guidance Computer and Jim breaks down everything you need to know about the ZFS ARC.

Plus an update on ZoL SIMD acceleration, your feedback, and an interesting new neuromorphic system from Intel.

Links:

  • ZFS On Linux Has Figured Out A Way To Restore SIMD Support On Linux 5.0+ — Those running ZFS On Linux (ZoL) on post-5.0 (and pre-5.0 supported LTS releases) have seen big performance hits to the ZFS encryption performance in particular. That came due to upstream breaking an interface used by ZFS On Linux and admittedly not caring about ZoL due to it being an out-of-tree user. But now several kernel releases later, a workaround has been devised.
  • ZFS On Linux Runs Into A Snag With Linux 5.0
  • NixOS Takes Action After 1.2GB/s ZFS Encryption Speed Drops To 200MB/s With Linux 5.0+ — A NixOS developer reports that the functions no longer exported by Linux 5.0+ and previously used by ZoL for AVX/AES-NI support end up dropping the ZFS data-set encryption performance to 200MB/s where as pre-5.0 kernels ran around 1.2GB/s
  • Linux 5.0 compat: SIMD compatibility · zfsonlinux/zfs@e5db313 — Restore the SIMD optimization for 4.19.38 LTS, 4.14.120 LTS, and 5.0 and newer kernels. This is accomplished by leveraging the fact that by definition dedicated kernel threads never need to concern themselves with saving and restoring the user FPU state. Therefore, they may use the FPU as long as we can guarantee user tasks always restore their FPU state before context switching back to user space.
  • no SIMD acceleration · Issue #8793 · zfsonlinux/zfs — 4.14.x, 4.19.x, 5.x all have no SIMD acceleration, it is like a turtle. very slow.
  • Chris's Wiki :: ZFS on Linux still has annoying issues with ARC size — One of the frustrating things about operating ZFS on Linux is that the ARC size is critical but ZFS's auto-tuning of it is opaque and apparently prone to malfunctions, where your ARC will mysteriously shrink drastically and then stick there.
  • Software woven into wire, Core rope and the Apollo Guidance Computer — One of the first computers to use integrated circuits, the Apollo Guidance Computer was lightweight enough and small enough to fly in space. An unusual feature that contributed to its small size was core rope memory, a technique of physically weaving software into high-density storage.
  • Virtual Apollo Guidance Computer (AGC) software — Since you are looking at this README file, you are in the "master" branch of the repository, which contains source-code transcriptions of the original Project Apollo software for the Apollo Guidance Computer (AGC) and Abort Guidance System (AGS), as well as our software for emulating the AGC, AGS, and some of their peripheral devices (such as the display-keyboard unit, or DSKY).
  • The Underappreciated Power of the Apollo Computer - The Atlantic — Without the computers on board the Apollo spacecraft, there would have been no moon landing, no triumphant first step, no high-water mark for human space travel. A pilot could never have navigated the way to the moon, as if a spaceship were simply a more powerful airplane. The calculations required to make in-flight adjustments and the complexity of the thrust controls outstripped human capacities.
  • Brains scale better than CPUs. So Intel is building brains | Ars Technica — Neuromorphic engineering—building machines that mimic the function of organic brains in hardware as well as software—is becoming more and more prominent. The field has progressed rapidly, from conceptual beginnings in the late 1980s to experimental field programmable neural arrays in 2006, early memristor-powered device proposals in 2012, IBM's TrueNorth NPU in 2014, and Intel's Loihi neuromorphic processor in 2017. Yesterday, Intel broke a little more new ground with the debut of a larger-scale neuromorphic system, Pohoiki Beach, which integrates 64 of its Loihi chips.
  • Dancing Demon - YouTube — Written in 1979 by Leo Christopherson for the Radio Shack TRS-80 Model I computer. This is the best game ever for at that time.
]]>
We take a look at the amazing abilities of the Apollo Guidance Computer and Jim breaks down everything you need to know about the ZFS ARC.

Plus an update on ZoL SIMD acceleration, your feedback, and an interesting new neuromorphic system from Intel.

Links:

  • ZFS On Linux Has Figured Out A Way To Restore SIMD Support On Linux 5.0+ — Those running ZFS On Linux (ZoL) on post-5.0 (and pre-5.0 supported LTS releases) have seen big performance hits to the ZFS encryption performance in particular. That came due to upstream breaking an interface used by ZFS On Linux and admittedly not caring about ZoL due to it being an out-of-tree user. But now several kernel releases later, a workaround has been devised.
  • ZFS On Linux Runs Into A Snag With Linux 5.0
  • NixOS Takes Action After 1.2GB/s ZFS Encryption Speed Drops To 200MB/s With Linux 5.0+ — A NixOS developer reports that the functions no longer exported by Linux 5.0+ and previously used by ZoL for AVX/AES-NI support end up dropping the ZFS data-set encryption performance to 200MB/s where as pre-5.0 kernels ran around 1.2GB/s
  • Linux 5.0 compat: SIMD compatibility · zfsonlinux/zfs@e5db313 — Restore the SIMD optimization for 4.19.38 LTS, 4.14.120 LTS, and 5.0 and newer kernels. This is accomplished by leveraging the fact that by definition dedicated kernel threads never need to concern themselves with saving and restoring the user FPU state. Therefore, they may use the FPU as long as we can guarantee user tasks always restore their FPU state before context switching back to user space.
  • no SIMD acceleration · Issue #8793 · zfsonlinux/zfs — 4.14.x, 4.19.x, 5.x all have no SIMD acceleration, it is like a turtle. very slow.
  • Chris's Wiki :: ZFS on Linux still has annoying issues with ARC size — One of the frustrating things about operating ZFS on Linux is that the ARC size is critical but ZFS's auto-tuning of it is opaque and apparently prone to malfunctions, where your ARC will mysteriously shrink drastically and then stick there.
  • Software woven into wire, Core rope and the Apollo Guidance Computer — One of the first computers to use integrated circuits, the Apollo Guidance Computer was lightweight enough and small enough to fly in space. An unusual feature that contributed to its small size was core rope memory, a technique of physically weaving software into high-density storage.
  • Virtual Apollo Guidance Computer (AGC) software — Since you are looking at this README file, you are in the "master" branch of the repository, which contains source-code transcriptions of the original Project Apollo software for the Apollo Guidance Computer (AGC) and Abort Guidance System (AGS), as well as our software for emulating the AGC, AGS, and some of their peripheral devices (such as the display-keyboard unit, or DSKY).
  • The Underappreciated Power of the Apollo Computer - The Atlantic — Without the computers on board the Apollo spacecraft, there would have been no moon landing, no triumphant first step, no high-water mark for human space travel. A pilot could never have navigated the way to the moon, as if a spaceship were simply a more powerful airplane. The calculations required to make in-flight adjustments and the complexity of the thrust controls outstripped human capacities.
  • Brains scale better than CPUs. So Intel is building brains | Ars Technica — Neuromorphic engineering—building machines that mimic the function of organic brains in hardware as well as software—is becoming more and more prominent. The field has progressed rapidly, from conceptual beginnings in the late 1980s to experimental field programmable neural arrays in 2006, early memristor-powered device proposals in 2012, IBM's TrueNorth NPU in 2014, and Intel's Loihi neuromorphic processor in 2017. Yesterday, Intel broke a little more new ground with the debut of a larger-scale neuromorphic system, Pohoiki Beach, which integrates 64 of its Loihi chips.
  • Dancing Demon - YouTube — Written in 1979 by Leo Christopherson for the Radio Shack TRS-80 Model I computer. This is the best game ever for at that time.
]]>
https://fireside.fm/player/v2/sHzmXDIv+NMK1f0Y- ]]> Wes Payne Jim Salter
407: Old School Outages https://techsnap.systems/407 a442674d-ddd6-471a-ac89-448f1d9a3284 Wed, 10 Jul 2019 22:00:00 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Jim shares his Nagios tips and Wes chimes in with some modern monitoring tools as we chat monitoring in the wake of some high-profile outages. 42:31 false Jim shares his Nagios tips and Wes chimes in with some modern tools as we chat monitoring in the wake of some high-profile outages.

Plus we turn our eye to hardware and get excited about the latest Ryzen line from AMD.

]]>
Ryzen, AMD, Epyc, Intel, CPU, server, server builds, performance, benchmarks, internet, xeon, ecc, outages, google, cloudflare, facebook, microsoft, BGP, regex, deployment, verizon, RKPI, bgp leak, internet infrastructure, monitoring, openNMS, libreNMS, nagios, zabbix, prometheus, riemann, time series, metrics, logs, logging, observability, grafana, netdata, NRPE, old school, sysadmin, infosec, DevOps, TechSNAP Jim shares his Nagios tips and Wes chimes in with some modern tools as we chat monitoring in the wake of some high-profile outages.

Plus we turn our eye to hardware and get excited about the latest Ryzen line from AMD.

Links:

]]>
Jim shares his Nagios tips and Wes chimes in with some modern tools as we chat monitoring in the wake of some high-profile outages.

Plus we turn our eye to hardware and get excited about the latest Ryzen line from AMD.

Links:

]]>
https://fireside.fm/player/v2/sHzmXDIv+PIPcQRiO ]]> Wes Payne Jim Salter
406: SACK Attack https://techsnap.systems/406 310be811-6d1b-4463-96f3-8fc9579a5d66 Sun, 23 Jun 2019 18:15:00 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting A new vulnerability may be the next 'Ping of Death'; we explore the details of SACK Panic and break down what you need to know. 43:33 false A new vulnerability may be the next 'Ping of Death'; we explore the details of SACK Panic and break down what you need to know.

Plus Firefox zero days targeting Coinbase, the latest update on Rowhammer, and a few more reasons it's a great time to be a ZFS user.

]]>
SACK Panic, TCP, networking, Linux, FreeBSD, security, mss, ping of death, rowhammer, rambleed, RAM, ECC, memory, DRAM, Firefox, backdoor, Mozilla, zero day, sandbox, sandbox escape, targeted attack, cryptocurrency, crypto, ZFS, OpenZFS, TRIM, SSD, encryption, raw send, device removal, DevOps, TechSNAP A new vulnerability may be the next 'Ping of Death'; we explore the details of SACK Panic and break down what you need to know.

Plus Firefox zero days targeting Coinbase, the latest update on Rowhammer, and a few more reasons it's a great time to be a ZFS user.

Links:

  • SACK Panic Security Bulletin — Netflix has identified several TCP networking vulnerabilities in FreeBSD and Linux kernels. The vulnerabilities specifically relate to the Maximum Segment Size (MSS) and TCP Selective Acknowledgement (SACK) capabilities. The most serious, dubbed “SACK Panic,” allows a remotely-triggered kernel panic on recent Linux kernels.
  • Ubuntu SACK Panic Guidance — You should update your kernel to the versions specified below in the Updates section and reboot. Alternatively, Canonical Livepatch updates will be available to mitigate these two issues without the need to reboot.
  • Red Hat SACK Panic Advisory — Red Hat customers running affected versions of these Red Hat products are strongly recommended to update them as soon as errata are available. Customers are urged to apply the available updates immediately and enable the mitigations as they feel appropriate.   
  • RFC 2018 - TCP Selective Acknowledgment Options — TCP may experience poor performance when multiple packets are lost from one window of data. With the limited information available from cumulative acknowledgments, a TCP sender can only learn about a single lost packet per round trip time. An aggressive sender could choose to retransmit packets early, but such retransmitted segments may have already been successfully received. A Selective Acknowledgment (SACK) mechanism, combined with a selective repeat retransmission policy, can help to overcome these limitations.
  • Ping of Death — In a nutshell, it is possible to crash, reboot or otherwise kill a large number of systems by sending a ping of a certain size from a remote machine.
  • Firefox zero-day was used in attack against Coinbase employees, not its users | ZDNet — A recent Firefox zero-day that has made headlines across the tech news world this week was actually used in attacks against Coinbase employees, and not the company's users.
  • Mozilla fixes second Firefox zero-day exploited in the wild | ZDNet — Mozilla has released a second security update this week to patch a second zero-day that was being exploited in the wild to attack Coinbase employees and other cryptocurrency organizations.
  • RAMBleed — RAMBleed is a side-channel attack that enables an attacker to read out physical memory belonging to other processes. The implications of violating arbitrary privilege boundaries are numerous, and vary in severity based on the other software running on the target machine. As an example, in our paper we demonstrate an attack against OpenSSH in which we use RAMBleed to leak a 2048 bit RSA key.
  • Digging into the new features in OpenZFS post-Linux migration | Ars Technica — One of the most important new features in 0.8 is Native ZFS Encryption. Until now, ZFS users have relied on OS-provided encrypted filesystem layers either above or below ZFS. While this approach does work, it presented difficulties.
  • Allan Jude on Twitter — Once the FreeBSDs are upstreamed, everything is changing to 'OpenZFS', including the github organization currently know as 'zfsonlinux'.
  • ZFS on Linux Releases
  • Linux Academy is hiring!
  • Mozilla teases $5-per-month ad-free news subscription — Mozilla has started teasing an ad-free news subscription service, which, for $5 per month, would offer ad-free browsing, audio readouts, and cross-platform syncing of news articles from a number of websites.
]]>
A new vulnerability may be the next 'Ping of Death'; we explore the details of SACK Panic and break down what you need to know.

Plus Firefox zero days targeting Coinbase, the latest update on Rowhammer, and a few more reasons it's a great time to be a ZFS user.

Links:

  • SACK Panic Security Bulletin — Netflix has identified several TCP networking vulnerabilities in FreeBSD and Linux kernels. The vulnerabilities specifically relate to the Maximum Segment Size (MSS) and TCP Selective Acknowledgement (SACK) capabilities. The most serious, dubbed “SACK Panic,” allows a remotely-triggered kernel panic on recent Linux kernels.
  • Ubuntu SACK Panic Guidance — You should update your kernel to the versions specified below in the Updates section and reboot. Alternatively, Canonical Livepatch updates will be available to mitigate these two issues without the need to reboot.
  • Red Hat SACK Panic Advisory — Red Hat customers running affected versions of these Red Hat products are strongly recommended to update them as soon as errata are available. Customers are urged to apply the available updates immediately and enable the mitigations as they feel appropriate.   
  • RFC 2018 - TCP Selective Acknowledgment Options — TCP may experience poor performance when multiple packets are lost from one window of data. With the limited information available from cumulative acknowledgments, a TCP sender can only learn about a single lost packet per round trip time. An aggressive sender could choose to retransmit packets early, but such retransmitted segments may have already been successfully received. A Selective Acknowledgment (SACK) mechanism, combined with a selective repeat retransmission policy, can help to overcome these limitations.
  • Ping of Death — In a nutshell, it is possible to crash, reboot or otherwise kill a large number of systems by sending a ping of a certain size from a remote machine.
  • Firefox zero-day was used in attack against Coinbase employees, not its users | ZDNet — A recent Firefox zero-day that has made headlines across the tech news world this week was actually used in attacks against Coinbase employees, and not the company's users.
  • Mozilla fixes second Firefox zero-day exploited in the wild | ZDNet — Mozilla has released a second security update this week to patch a second zero-day that was being exploited in the wild to attack Coinbase employees and other cryptocurrency organizations.
  • RAMBleed — RAMBleed is a side-channel attack that enables an attacker to read out physical memory belonging to other processes. The implications of violating arbitrary privilege boundaries are numerous, and vary in severity based on the other software running on the target machine. As an example, in our paper we demonstrate an attack against OpenSSH in which we use RAMBleed to leak a 2048 bit RSA key.
  • Digging into the new features in OpenZFS post-Linux migration | Ars Technica — One of the most important new features in 0.8 is Native ZFS Encryption. Until now, ZFS users have relied on OS-provided encrypted filesystem layers either above or below ZFS. While this approach does work, it presented difficulties.
  • Allan Jude on Twitter — Once the FreeBSDs are upstreamed, everything is changing to 'OpenZFS', including the github organization currently know as 'zfsonlinux'.
  • ZFS on Linux Releases
  • Linux Academy is hiring!
  • Mozilla teases $5-per-month ad-free news subscription — Mozilla has started teasing an ad-free news subscription service, which, for $5 per month, would offer ad-free browsing, audio readouts, and cross-platform syncing of news articles from a number of websites.
]]>
https://fireside.fm/player/v2/sHzmXDIv+QqsmCtK7 ]]> Wes Payne Jim Salter
405: Update Uncertainty https://techsnap.systems/405 8a576c94-20cc-497c-9de7-8402cd0a1135 Tue, 11 Jun 2019 20:15:00 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting We explore the risky world of exposed RDP, from the brute force GoldBrute botnet to the dangerously worm-able BlueKeep vulnerability. 30:47 false We explore the risky world of exposed RDP, from the brute force GoldBrute botnet to the dangerously worm-able BlueKeep vulnerability.

Plus the importance of automatic updates, and Jim's new backup box.

]]>
BlueKeep, RDP, GoldBrute, Terminal Services, Remote Desktop, Windows, Windows Update, network security, security, firewalls, worm, internet worm, wannacry, NSA, Microsoft, updates, patching, vulnerabilities, automatic updates, backups, supermicro, rosewill, ssd, hard drive, NAS, storage, brute force, industrial control systems, out of support, windows xp, patching policies, password security, remote desktop protocol, DevOps, TechSNAP We explore the risky world of exposed RDP, from the brute force GoldBrute botnet to the dangerously worm-able BlueKeep vulnerability.

Plus the importance of automatic updates, and Jim's new backup box.

Links:

  • Errata Security: Almost One Million Vulnerable to BlueKeep Vuln (CVE-2019-0708) — Microsoft announced a vulnerability in it's "Remote Desktop" product that can lead to robust, wormable exploits. I scanned the Internet to assess the danger. I find nearly 1-million devices on the public Internet that are vulnerable to the bug.
  • Even the NSA is urging Windows users to patch BlueKeep (CVE-2019-0708) | ZDNet — "[The] NSA is concerned that malicious cyber actors will use the vulnerability in ransomware and exploit kits containing other known exploits, increasing capabilities against other unpatched systems.
  • Prevent a worm by updating Remote Desktop Services (CVE-2019-0708) – MSRC — This vulnerability is pre-authentication and requires no user interaction. In other words, the vulnerability is ‘wormable’, meaning that any future malware that exploits this vulnerability could propagate from vulnerable computer to vulnerable computer in a similar way as the WannaCry malware spread across the globe in 2017
  • BlueKeep - everyone agrees, you should patch PCs running legacy versions of Windows — I have this horrible feeling that the only way we’re going to wake the world up to the need to patch their ageing versions of Windows against the BlueKeep vulnerability is to wait until a malicious worm begins to spread around the world.
  • CVE-2019-0708 | Remote Desktop Services Remote Code Execution Vulnerability — A remote code execution vulnerability exists in Remote Desktop Services – formerly known as Terminal Services – when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests. This vulnerability is pre-authentication and requires no user interaction. An attacker who successfully exploited this vulnerability could execute arbitrary code on the target system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
  • Customer guidance for CVE-2019-0708 | Remote Desktop Services Remote Code Execution Vulnerability — Microsoft is aware that some customers are running versions of Windows that no longer receive mainstream support. That means those customers will not have received any security updates to protect their systems from CVE-2019-0708, which is a critical remote code execution vulnerability.
  • Forget BlueKeep: Beware the GoldBrute | Threatpost — In the past few days, GoldBrute (named after the Java class it uses) has attempted to brute-force Remote Desktop Protocol (RDP) connections for 1.5 million Windows systems and counting, according to Morphus Labs chief research officer Renato Marinho. The botnet is actively scanning the internet for machines with RDP exposed, and trying out weak or reused passwords to see if it can gain access to the systems.
  • The GoldBrute botnet — The latest round of bad news emerged last week when Morphus Labs’ researcher Renato Marinho announced the discovery of an aggressive brute force campaign against 1.5 million RDP servers by a botnet called ‘GoldBrute’.
  • Ubuntu Automatic Updates — The unattended-upgrades package can be used to automatically install updated packages, and can be configured to update all packages or just install security updates.
  • AutoUpdates - Fedora Project Wiki — You must decide whether to use automatic DNF or YUM updates on each of your machines.
  • It's time to block Windows Automatic Updating | Computerworld — Those of you who feel it’s important to install Windows and Office patches the moment they come out – I salute you. The Windows world needs more cannon fodder.
  • Windows 10's Ugly Updates Just Got Uglier. Here's How To Stay Safe by Disabling Automatic Updates — Stay safe by disabling automatic updates? How is that possible? As a general rule of thumb, I’d never recommend disabling updates because security patches are essential. But the situation with Windows 10 has become intolerable. Microsoft continues to fail and continues to release update after update that they know, or should know, has serious problems.
  • Jim's New Rig — I build, sell, and manage much bigger and meaner systems than this all the time. But this one's MINE! 12 hot swap bays, Ryzen 7 2700 w/ ECC RAM, quiet enough to share an office with, and the trays can take either HDD or SSD with no adapter needed.
]]>
We explore the risky world of exposed RDP, from the brute force GoldBrute botnet to the dangerously worm-able BlueKeep vulnerability.

Plus the importance of automatic updates, and Jim's new backup box.

Links:

  • Errata Security: Almost One Million Vulnerable to BlueKeep Vuln (CVE-2019-0708) — Microsoft announced a vulnerability in it's "Remote Desktop" product that can lead to robust, wormable exploits. I scanned the Internet to assess the danger. I find nearly 1-million devices on the public Internet that are vulnerable to the bug.
  • Even the NSA is urging Windows users to patch BlueKeep (CVE-2019-0708) | ZDNet — "[The] NSA is concerned that malicious cyber actors will use the vulnerability in ransomware and exploit kits containing other known exploits, increasing capabilities against other unpatched systems.
  • Prevent a worm by updating Remote Desktop Services (CVE-2019-0708) – MSRC — This vulnerability is pre-authentication and requires no user interaction. In other words, the vulnerability is ‘wormable’, meaning that any future malware that exploits this vulnerability could propagate from vulnerable computer to vulnerable computer in a similar way as the WannaCry malware spread across the globe in 2017
  • BlueKeep - everyone agrees, you should patch PCs running legacy versions of Windows — I have this horrible feeling that the only way we’re going to wake the world up to the need to patch their ageing versions of Windows against the BlueKeep vulnerability is to wait until a malicious worm begins to spread around the world.
  • CVE-2019-0708 | Remote Desktop Services Remote Code Execution Vulnerability — A remote code execution vulnerability exists in Remote Desktop Services – formerly known as Terminal Services – when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests. This vulnerability is pre-authentication and requires no user interaction. An attacker who successfully exploited this vulnerability could execute arbitrary code on the target system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
  • Customer guidance for CVE-2019-0708 | Remote Desktop Services Remote Code Execution Vulnerability — Microsoft is aware that some customers are running versions of Windows that no longer receive mainstream support. That means those customers will not have received any security updates to protect their systems from CVE-2019-0708, which is a critical remote code execution vulnerability.
  • Forget BlueKeep: Beware the GoldBrute | Threatpost — In the past few days, GoldBrute (named after the Java class it uses) has attempted to brute-force Remote Desktop Protocol (RDP) connections for 1.5 million Windows systems and counting, according to Morphus Labs chief research officer Renato Marinho. The botnet is actively scanning the internet for machines with RDP exposed, and trying out weak or reused passwords to see if it can gain access to the systems.
  • The GoldBrute botnet — The latest round of bad news emerged last week when Morphus Labs’ researcher Renato Marinho announced the discovery of an aggressive brute force campaign against 1.5 million RDP servers by a botnet called ‘GoldBrute’.
  • Ubuntu Automatic Updates — The unattended-upgrades package can be used to automatically install updated packages, and can be configured to update all packages or just install security updates.
  • AutoUpdates - Fedora Project Wiki — You must decide whether to use automatic DNF or YUM updates on each of your machines.
  • It's time to block Windows Automatic Updating | Computerworld — Those of you who feel it’s important to install Windows and Office patches the moment they come out – I salute you. The Windows world needs more cannon fodder.
  • Windows 10's Ugly Updates Just Got Uglier. Here's How To Stay Safe by Disabling Automatic Updates — Stay safe by disabling automatic updates? How is that possible? As a general rule of thumb, I’d never recommend disabling updates because security patches are essential. But the situation with Windows 10 has become intolerable. Microsoft continues to fail and continues to release update after update that they know, or should know, has serious problems.
  • Jim's New Rig — I build, sell, and manage much bigger and meaner systems than this all the time. But this one's MINE! 12 hot swap bays, Ryzen 7 2700 w/ ECC RAM, quiet enough to share an office with, and the trays can take either HDD or SSD with no adapter needed.
]]>
https://fireside.fm/player/v2/sHzmXDIv+fcYhCMgj ]]> Wes Payne Jim Salter
404: Prefork Pitfalls https://techsnap.systems/404 e2a5afa9-3180-4551-91a0-e84e65eb61e1 Sat, 25 May 2019 18:00:00 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting We turn our eye to web server best practices, from the basics of CDNs to the importance of choosing the right multi-processing module. 33:49 false We turn our eye to web server best practices, from the basics of CDNs to the importance of choosing the right multi-processing module.

Plus the right way to setup PHP, the trouble with benchmarking, and when to choose NGiNX.

]]>
HTTP, web servers, nginx, apache, lighttpd, prefork, mod_php, php, concurrency, threadpool, threads, scalability, event loop, apache mpms, Multi-Processing Modules, varnish, CDN, static sites, wordpress, apache bench, benchmarking, w3 total cache, performance, networking, sysadmin, web hosting, DevOps, TechSNAP We turn our eye to web server best practices, from the basics of CDNs to the importance of choosing the right multi-processing module.

Plus the right way to setup PHP, the trouble with benchmarking, and when to choose NGiNX.

Links:

  • Jim's Blog: Installing WordPress on Apache the modern way — It’s been bugging me for a while that there are no correct guides to be found about using modern Apache 2.4 or above with the Event or Worker MPMs. We’re going to go ahead and correct that lapse today, by walking through a brand-new WordPress install on a new Ubuntu 18.04 VM.
  • Apache Performance Tuning — Apache 2.x is a general-purpose webserver, designed to provide a balance of flexibility, portability, and performance. Although it has not been designed specifically to set benchmark records, Apache 2.x is capable of high performance in many real-world situations.
  • Tuning Your Apache Server
  • worker - Apache HTTP Server Version 2.4 — This Multi-Processing Module (MPM) implements a hybrid multi-process multi-threaded server. By using threads to serve requests, it is able to serve a large number of requests with fewer system resources than a process-based server.
  • event - Apache HTTP Server Version 2.4 — The event Multi-Processing Module (MPM) is designed to allow more requests to be served simultaneously by passing off some processing work to the listeners threads, freeing up the worker threads to serve new requests.
  • PHP-FPM — PHP-FPM (FastCGI Process Manager) is an alternative PHP FastCGI implementation with some additional features useful for sites of any size, especially busier sites.
  • FastCGI overview — FastCGI is a way to have CGI scripts execute time-consuming code (like opening a database) only once, rather than every time the script is loaded. In technical terms, FastCGI is a language independent, scalable, open extension to CGI that provides high performance without the limitations of server specific APIs.
  • Alexa Top 500 Global Sites
  • What Is a CDN? How Does a CDN work? — A content delivery network (CDN) refers to a geographically distributed group of servers which work together to provide fast delivery of Internet content.
  • W3 Total Cache – WordPress plugin — W3 Total Cache improves the SEO and user experience of your site by increasing website performance, reducing load times via features like content delivery network (CDN) integration and the latest best practices.
  • krakjoe/apcu: APCu - APC User Cache — APCu is an in-memory key-value store for PHP. Keys are of type string and values can be any PHP variables.
  • PHP: APCu - Manual
  • Introduction to Varnish — Varnish HTTP Cache — Varnish Cache is a web application accelerator also known as a caching HTTP reverse proxy. You install it in front of any server that speaks HTTP and configure it to cache the contents. Varnish Cache is really, really fast. It typically speeds up delivery with a factor of 300 - 1000x, depending on your architectur
  • ab - Apache HTTP server benchmarking tool — ab is a tool for benchmarking your Apache Hypertext Transfer Protocol (HTTP) server. It is designed to give you an impression of how your current Apache installation performs. This especially shows you how many requests per second your Apache installation is capable of serving.
  • HTTP(S) Benchmark Tools
  • jimsalterjrs/network-testing — This is a small collection of GPLv3-licensed tools to assist an intrepid researcher in testing the performance of networks, wired or wireless.
]]>
We turn our eye to web server best practices, from the basics of CDNs to the importance of choosing the right multi-processing module.

Plus the right way to setup PHP, the trouble with benchmarking, and when to choose NGiNX.

Links:

  • Jim's Blog: Installing WordPress on Apache the modern way — It’s been bugging me for a while that there are no correct guides to be found about using modern Apache 2.4 or above with the Event or Worker MPMs. We’re going to go ahead and correct that lapse today, by walking through a brand-new WordPress install on a new Ubuntu 18.04 VM.
  • Apache Performance Tuning — Apache 2.x is a general-purpose webserver, designed to provide a balance of flexibility, portability, and performance. Although it has not been designed specifically to set benchmark records, Apache 2.x is capable of high performance in many real-world situations.
  • Tuning Your Apache Server
  • worker - Apache HTTP Server Version 2.4 — This Multi-Processing Module (MPM) implements a hybrid multi-process multi-threaded server. By using threads to serve requests, it is able to serve a large number of requests with fewer system resources than a process-based server.
  • event - Apache HTTP Server Version 2.4 — The event Multi-Processing Module (MPM) is designed to allow more requests to be served simultaneously by passing off some processing work to the listeners threads, freeing up the worker threads to serve new requests.
  • PHP-FPM — PHP-FPM (FastCGI Process Manager) is an alternative PHP FastCGI implementation with some additional features useful for sites of any size, especially busier sites.
  • FastCGI overview — FastCGI is a way to have CGI scripts execute time-consuming code (like opening a database) only once, rather than every time the script is loaded. In technical terms, FastCGI is a language independent, scalable, open extension to CGI that provides high performance without the limitations of server specific APIs.
  • Alexa Top 500 Global Sites
  • What Is a CDN? How Does a CDN work? — A content delivery network (CDN) refers to a geographically distributed group of servers which work together to provide fast delivery of Internet content.
  • W3 Total Cache – WordPress plugin — W3 Total Cache improves the SEO and user experience of your site by increasing website performance, reducing load times via features like content delivery network (CDN) integration and the latest best practices.
  • krakjoe/apcu: APCu - APC User Cache — APCu is an in-memory key-value store for PHP. Keys are of type string and values can be any PHP variables.
  • PHP: APCu - Manual
  • Introduction to Varnish — Varnish HTTP Cache — Varnish Cache is a web application accelerator also known as a caching HTTP reverse proxy. You install it in front of any server that speaks HTTP and configure it to cache the contents. Varnish Cache is really, really fast. It typically speeds up delivery with a factor of 300 - 1000x, depending on your architectur
  • ab - Apache HTTP server benchmarking tool — ab is a tool for benchmarking your Apache Hypertext Transfer Protocol (HTTP) server. It is designed to give you an impression of how your current Apache installation performs. This especially shows you how many requests per second your Apache installation is capable of serving.
  • HTTP(S) Benchmark Tools
  • jimsalterjrs/network-testing — This is a small collection of GPLv3-licensed tools to assist an intrepid researcher in testing the performance of networks, wired or wireless.
]]>
https://fireside.fm/player/v2/sHzmXDIv+QJhOahnb ]]> Wes Payne Jim Salter
403: Keeping Systems Simple https://techsnap.systems/403 e26c9e2a-3e0f-40b9-9875-d72821ee1792 Fri, 10 May 2019 21:00:00 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting We’re back from LinuxFest Northwest with an update on all things WireGuard, some VLAN myth busting, and the trade-offs of highly available systems. 46:32 false We’re back from LinuxFest Northwest with an update on all things WireGuard, some VLAN myth busting, and the trade-offs of highly available systems.

]]>
wireguard, vpn, openvpn, tinc, ipsec, lfnw, tunnel, ssh, mesh network, layer 3, tcp, udp, dhcp, ethernet, vlan, switch, router, firewall, kubernetes, linux, wintun, high availability, reliability, availability, disaster recovery, rto, rpo, security, quantum computers, cryptography, simplicity, SysAdmin podcast, subspace, zinc, DevOps, TechSNAP We’re back from LinuxFest Northwest with an update on all things WireGuard, some VLAN myth busting, and the trade-offs of highly available systems.

Links:

  • TechSNAP Episode 390: What’s Up with WireGuard
  • WireGuard Sent Out Again For Review — WireGuard lead developer Jason Donenfeld has sent out the ninth version of the WireGuard secure network tunnel patches for review. If this review goes well and lands in net-next in the weeks ahead, this long-awaited VPN improvement could make it into the mainline Linux 5.2 kernel.
  • CloudFlare announces Warp VPN — Using Cloudflare’s existing network of servers, Internet users all over the world will be able to connect to Warp VPN through the 1.1.1.1 app. In the same vein, Warp VPN will not significantly increase battery usage by using an efficient protocol called WireGuard.
  • CloudFlare Launches "BoringTun" As Rust-Written WireGuard User-Space Implementation - Phoronix — CloudFlare took to creating BoringTun as they wanted a user-space solution as not to have to deal with kernel modules or satisfying certain kernel versions. They also wanted cross platform support and for their chosen implementation to be very fast, these choices which led them to writing a Rust-based solution.
  • cloudflare/boringtun — BoringTun is an implementation of the WireGuard® protocol designed for portability and speed.
  • VPN protocol WireGuard now has an official macOS app — You can already download the WireGuard app on Android and iOS, but today’s release is all about macOS.
  • WireGuard Windows Pre-Alpha — I've been mostly absent these last weeks, due to being completely absorbed in Windows programming. I think we're finally getting to the state where we might really benefit from testing of the "pre-alpha".
  • Wintun – Layer 3 TUN Driver for Windows — Wintun is a very simple and minimal TUN driver for the Windows kernel, which provides userspace programs with a simple network adapter for reading and writing packets. It is akin to Linux's /dev/net/tun and BSD's /dev/tun.
  • WireGuard for Kubernetes: Introducing Gravitational Wormhole — Wormhole is a Kubernetes network plugin that combines the simplicity of flannel with encrypted networking from WireGuard.
  • gravitational/wormhole: Wireguard based overlay network CNI plugin for kubernetes
  • NetworkManager 1.16 — NetworkManager 1.16 is a big feature release bringing support for WireGuard VPN tunnels
  • Portal Cloud - Subspace — Subspace is an open source WireGuard® VPN server that supports connecting all of your devices to help secure your internet access.
  • subspacecloud/subspace — A simple WireGuard VPN server GUI
  • jimsalterjrs/wg-admin — Simple CLI utilities to manage a WireGuard server
  • 5 big misconceptions about virtual LANs — In the real world, VLANs are anything but simple.
  • High Availability vs. Fault Tolerance vs. Disaster Recovery — You need IT infrastructure that you can count on even when you run into the rare network outage, equipment failure, or power issue. When your systems run into trouble, that’s where one or more of the three primary availability strategies will come into play: high availability, fault tolerance, and/or disaster recovery.
  • High Availability: Concepts and Theory — Running server operations using clusters of either physical or virtual computers is all about improving both reliability and performance over and above what you could expect from a single, high-powered server.
  • RPO and RTO: Understanding the Differences — Recovery time objective refers to how much time an application can be down without causing significant damage to the business. Recovery point objectives refer to your company’s loss tolerance: the amount of data that can be lost before significant harm to the business occurs.
  • JupiterBroadcasting/Talks — Public repository of crew talks, slides, and additional resources.
  • Command Line Threat Hunting — That viruses and malware are Windows problems is a misnomer that is often propagated through the Linux community and it's an easy one to believe until you start noticing strange behavior on your system. What do you do next? Join Ell Marquez and Tony Lambert in discussing a common sense approach to threat detection using only command line tools.
  • Fear the Man in the Middle? This company wants to sell quantum key distribution — For now, Quantum XChange has only said about a dozen companies are part of the pilot. But with the appetite for quantum solutions in the US increasing—the National Quantum Initiative was just signed into law at the end of 2018 to advance the tech—this could be an opportune time to enter the market, so long as the service lives up to its billing.
]]>
We’re back from LinuxFest Northwest with an update on all things WireGuard, some VLAN myth busting, and the trade-offs of highly available systems.

Links:

  • TechSNAP Episode 390: What’s Up with WireGuard
  • WireGuard Sent Out Again For Review — WireGuard lead developer Jason Donenfeld has sent out the ninth version of the WireGuard secure network tunnel patches for review. If this review goes well and lands in net-next in the weeks ahead, this long-awaited VPN improvement could make it into the mainline Linux 5.2 kernel.
  • CloudFlare announces Warp VPN — Using Cloudflare’s existing network of servers, Internet users all over the world will be able to connect to Warp VPN through the 1.1.1.1 app. In the same vein, Warp VPN will not significantly increase battery usage by using an efficient protocol called WireGuard.
  • CloudFlare Launches "BoringTun" As Rust-Written WireGuard User-Space Implementation - Phoronix — CloudFlare took to creating BoringTun as they wanted a user-space solution as not to have to deal with kernel modules or satisfying certain kernel versions. They also wanted cross platform support and for their chosen implementation to be very fast, these choices which led them to writing a Rust-based solution.
  • cloudflare/boringtun — BoringTun is an implementation of the WireGuard® protocol designed for portability and speed.
  • VPN protocol WireGuard now has an official macOS app — You can already download the WireGuard app on Android and iOS, but today’s release is all about macOS.
  • WireGuard Windows Pre-Alpha — I've been mostly absent these last weeks, due to being completely absorbed in Windows programming. I think we're finally getting to the state where we might really benefit from testing of the "pre-alpha".
  • Wintun – Layer 3 TUN Driver for Windows — Wintun is a very simple and minimal TUN driver for the Windows kernel, which provides userspace programs with a simple network adapter for reading and writing packets. It is akin to Linux's /dev/net/tun and BSD's /dev/tun.
  • WireGuard for Kubernetes: Introducing Gravitational Wormhole — Wormhole is a Kubernetes network plugin that combines the simplicity of flannel with encrypted networking from WireGuard.
  • gravitational/wormhole: Wireguard based overlay network CNI plugin for kubernetes
  • NetworkManager 1.16 — NetworkManager 1.16 is a big feature release bringing support for WireGuard VPN tunnels
  • Portal Cloud - Subspace — Subspace is an open source WireGuard® VPN server that supports connecting all of your devices to help secure your internet access.
  • subspacecloud/subspace — A simple WireGuard VPN server GUI
  • jimsalterjrs/wg-admin — Simple CLI utilities to manage a WireGuard server
  • 5 big misconceptions about virtual LANs — In the real world, VLANs are anything but simple.
  • High Availability vs. Fault Tolerance vs. Disaster Recovery — You need IT infrastructure that you can count on even when you run into the rare network outage, equipment failure, or power issue. When your systems run into trouble, that’s where one or more of the three primary availability strategies will come into play: high availability, fault tolerance, and/or disaster recovery.
  • High Availability: Concepts and Theory — Running server operations using clusters of either physical or virtual computers is all about improving both reliability and performance over and above what you could expect from a single, high-powered server.
  • RPO and RTO: Understanding the Differences — Recovery time objective refers to how much time an application can be down without causing significant damage to the business. Recovery point objectives refer to your company’s loss tolerance: the amount of data that can be lost before significant harm to the business occurs.
  • JupiterBroadcasting/Talks — Public repository of crew talks, slides, and additional resources.
  • Command Line Threat Hunting — That viruses and malware are Windows problems is a misnomer that is often propagated through the Linux community and it's an easy one to believe until you start noticing strange behavior on your system. What do you do next? Join Ell Marquez and Tony Lambert in discussing a common sense approach to threat detection using only command line tools.
  • Fear the Man in the Middle? This company wants to sell quantum key distribution — For now, Quantum XChange has only said about a dozen companies are part of the pilot. But with the appetite for quantum solutions in the US increasing—the National Quantum Initiative was just signed into law at the end of 2018 to advance the tech—this could be an opportune time to enter the market, so long as the service lives up to its billing.
]]>
https://fireside.fm/player/v2/sHzmXDIv+apDx9sVl ]]> Wes Payne Jim Salter
402: Snapshot Sanity https://techsnap.systems/402 fbd74a16-dc81-4558-b87a-ff25a23a3669 Thu, 25 Apr 2019 16:45:00 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting We continue our take on ZFS as Jim and Wes dive in to snapshots, replication, and the magic on copy on write. 31:33 false We continue our take on ZFS as Jim and Wes dive in to snapshots, replication, and the magic on copy on write.

Plus some handy tools to manage your snapshots, rsync war stories, and more!

]]>
zfs, openzfs, zfs on linux, ZoL, snapshots, replication, sanoid, syncoid, policy based, snapshot management, copy on write, functional filesystem, toml, linked list, data integrity, crash consistent, atomic, atomic snapshot, rsync, cron, filesystems, warstories, SysAdmin podcast, DevOps, TechSNAP We continue our take on ZFS as Jim and Wes dive in to snapshots, replication, and the magic on copy on write.

Plus some handy tools to manage your snapshots, rsync war stories, and more!

Links:

]]>
We continue our take on ZFS as Jim and Wes dive in to snapshots, replication, and the magic on copy on write.

Plus some handy tools to manage your snapshots, rsync war stories, and more!

Links:

]]>
https://fireside.fm/player/v2/sHzmXDIv+T0CMNbkn ]]> Wes Payne Jim Salter
401: Everyday ZFS https://techsnap.systems/401 ea1f89db-e748-47fd-b288-833a330704ce Thu, 11 Apr 2019 22:15:00 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Jim and Wes sit down to bust some ZFS myths and share their tips and tricks for getting the most out of the ultimate filesystem. 47:35 false Jim and Wes sit down to bust some ZFS myths and share their tips and tricks for getting the most out of the ultimate filesystem.

Plus when not to use ZFS, the surprising way your disks are lying to you, and more!

]]>
zfs, vdez, filesystems, sun microsystems, backups, snapshots, copy on write, throughput, iops, linux, GPL, CDDL, ZFS on Linux, ZoL, ashift, SSD, techSNAP, sysadmin podcast, DevOps, data integrity, checksum, ECC, hard drives, hard disks, FreeBSD, OpenZF S, Solaris, RAID, raidz, zfs on root, ubuntu, copyleft Jim and Wes sit down to bust some ZFS myths and share their tips and tricks for getting the most out of the ultimate filesystem.

Plus when not to use ZFS, the surprising way your disks are lying to you, and more!

Links:

  • ZFS - Ubuntu Wiki — ZFS is a combined file system and logical volume manager designed and implemented by a team at Sun Microsystems led by Jeff Bonwick and Matthew Ahrens.
  • Performance tuning - OpenZFS — Make sure that you create your pools such that the vdevs have the correct alignment shift for your storage device's size. if dealing with flash media, this is going to be either 12 (4K sectors) or 13 (8K sectors).
]]>
Jim and Wes sit down to bust some ZFS myths and share their tips and tricks for getting the most out of the ultimate filesystem.

Plus when not to use ZFS, the surprising way your disks are lying to you, and more!

Links:

  • ZFS - Ubuntu Wiki — ZFS is a combined file system and logical volume manager designed and implemented by a team at Sun Microsystems led by Jeff Bonwick and Matthew Ahrens.
  • Performance tuning - OpenZFS — Make sure that you create your pools such that the vdevs have the correct alignment shift for your storage device's size. if dealing with flash media, this is going to be either 12 (4K sectors) or 13 (8K sectors).
]]>
https://fireside.fm/player/v2/sHzmXDIv+Vhp5epFP ]]> Wes Payne Jim Salter
400: Supply Chain Attacks https://techsnap.systems/400 c46ae690-b668-4708-a781-8e923bc4baf4 Thu, 28 Mar 2019 20:15:00 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting We break down the ASUS Live Update backdoor and explore why these kinds of supply chain attacks are on the rise. 32:33 false We break down the ASUS Live Update backdoor and explore why these kinds of supply chain attacks are on the rise.

Plus an update from the linux vendor firmware service, your feedback, and more!

]]>
ASUS, ASUS Malware, ShadowHammer, ASUS Live Update firmware, shadowpad, cccleaner, badusb, ssd firmware, microcontroller, reflections on trusting trust, compiler, c runtime, UEFI, BIOS, intel management engine, machine learning, unsupervised learning, malware, backdoor, command and control server, mac address, windows, linux, linux vendor firmware service, fwupd, package managers, node, npm, python, pypi, ken thompson, supply chain, supply chain attacks, gigabyte, hardware manufacturers, SysAdmin podcast, DevOps, TechSNAP We break down the ASUS Live Update backdoor and explore why these kinds of supply chain attacks are on the rise.

Plus an update from the linux vendor firmware service, your feedback, and more!

Links:

  • Joren Verspeurt on Twitter — The explanation you gave for unsupervised wasn't correct, that was just using a net that was trained in a supervised way. Unsupervised learning doesn't involve labels at all. A good example: clustering. You say "there are x clusters" and it learns a way of grouping similar items.
  • Hackers Hijacked ASUS Software Updates to Install Backdoors on Thousands of Computers — The researchers estimate half a million Windows machines received the malicious backdoor through the ASUS update server, although the attackers appear to have been targeting only about 600 of those systems.
  • Malicious updates for ASUS laptops — A threat actor modified the ASUS Live Update Utility, which delivers BIOS, UEFI, and software updates to ASUS laptops and desktops, added a back door to the utility, and then distributed it to users through official channels.
  • Asus Live Update Patch Now Availabile — Asus has emitted a non-spyware-riddled version of Live Update for people to install on its notebooks, which includes extra security features to hopefully detect any future tampering.
  • ASUS response to the recent media reports regarding ASUS Live Update tool attack by Advanced Persistent Threat (APT) groups — ASUS has also implemented a fix in the latest version (ver. 3.6.8) of the Live Update software, introduced multiple security verification mechanisms to prevent any malicious manipulation in the form of software updates or other means, and implemented an enhanced end-to-end encryption mechanism. At the same time, we have also updated and strengthened our server-to-end-user software architecture to prevent similar attacks from happening in the future.
  • The Messy Truth About Infiltrating Computer Supply Chains — The Defense Intelligence Agency believed that China’s capability at exploiting the BIOS “reflects a qualitative leap forward in exploitation that is difficult to detect”
  • Inside the Unnerving CCleaner Supply Chain Attack — Security researchers at Cisco Talos and Morphisec made a worst nightmare-type disclosure: the ubiquitous computer cleanup tool CCleaner had been compromised by hackers for more than a month. The software updates users were downloading from CCleaner owner Avast—a security company itself—had been tainted with a malware backdoor. The incident exposed millions of computers and reinforced the threat of so-called digital supply chain attacks, situations where trusted, widely distributed software is actually infected by malicious code.
  • ShadowPad: How Attackers hide Backdoor in Software used by Hundreds of Large Companies around the World — ShadowPad is an example of how dangerous and wide-scale a successful supply-chain attack can be. Given the opportunities for reach and data collection it gives to the attackers, most likely it will be reproduced again and again with some other widely used software component.
  • Gaming industry still in the scope of attackers in Asia — Yet again, new supply-chain attacks recently caught the attention of ESET Researchers. This time, two games and one gaming platform application were compromised to include a backdoor.
  • Microsoft Security Intelligence Report Volume 24 is now available — Software supply chain attacks are another trend that Microsoft has been tracking for several years. One supply chain tactic used by attackers is to incorporate a compromised component into a legitimate application or update package, which then is distributed to the users via the software. These attacks can be very difficult to detect because they take advantage of the trust that users have in their software vendors. The report includes several examples, including the Dofoil campaign, which illustrates how wide-reaching these types of attacks are and what we are doing to prevent and respond to them.
  • Microsoft Security Intelligence Report Volume 24
  • Supply Chain Attacks Spiked 78 Percent in 2018
  • Supply Chain Security: A Talk by Bunnie Huang — I recently gave an invited talk about supply chain security at BlueHat IL 2019. I was a bit surprised at the level of interest it received, so I thought I’d share it here for people who might have missed it.
  • Attack inception: Compromised supply chain within a supply chain poses new risk — The plot twist: The app vendor’s systems were unaffected. The compromise was traceable instead to a second software vendor that hosted additional packages used by the app during installation. This turned out be an interesting and unique case of an attack involving “the supply chain of the supply chain”.
  • Supply Chain Attacks and Secure Software Updates — In general, a supply chain attack involves first hacking a trusted third party who provides a product or service to your target, and then using your newly acquired, privileged position to compromise your intended target.
  • Bad USB, Very Bad USB — The best defense for this type of attack is to only use devices that do not have reprogrammable firmware. Outside of this, it is important to only use USB drives that you trust completely, because after plugging in an untrusted device, you will never know if there is an invisible threat running on your computer.
  • Reflections on Trusting Trust by Ken Thompson
  • LVFS Project Announcement - The Linux Foundation — The Linux Foundation welcomes the Linux Vendor Firmware Service (LVFS) as a new project. LVFS is a secure website that allows hardware vendors to upload firmware updates. It’s used by all major Linux distributions to provide metadata for clients, such as fwupdmgr, GNOME Software and KDE Discover.
  • LVFS: Vendor Status
  • Two new supply-chain attacks come to light in less than a week — Called “Colourama,” the package looked similar to Colorama, which is one of the top-20 most-downloaded legitimate modules in the Python repository. The doppelgänger Colourama package contained most of the legitimate functions of the legitimate module, with one significant difference: Colourama added code that, when run on Windows servers, installed a Visual Basic script.
  • Malicious code found in npm package event-stream downloaded 8 million times in the past 2.5 months
]]>
We break down the ASUS Live Update backdoor and explore why these kinds of supply chain attacks are on the rise.

Plus an update from the linux vendor firmware service, your feedback, and more!

Links:

  • Joren Verspeurt on Twitter — The explanation you gave for unsupervised wasn't correct, that was just using a net that was trained in a supervised way. Unsupervised learning doesn't involve labels at all. A good example: clustering. You say "there are x clusters" and it learns a way of grouping similar items.
  • Hackers Hijacked ASUS Software Updates to Install Backdoors on Thousands of Computers — The researchers estimate half a million Windows machines received the malicious backdoor through the ASUS update server, although the attackers appear to have been targeting only about 600 of those systems.
  • Malicious updates for ASUS laptops — A threat actor modified the ASUS Live Update Utility, which delivers BIOS, UEFI, and software updates to ASUS laptops and desktops, added a back door to the utility, and then distributed it to users through official channels.
  • Asus Live Update Patch Now Availabile — Asus has emitted a non-spyware-riddled version of Live Update for people to install on its notebooks, which includes extra security features to hopefully detect any future tampering.
  • ASUS response to the recent media reports regarding ASUS Live Update tool attack by Advanced Persistent Threat (APT) groups — ASUS has also implemented a fix in the latest version (ver. 3.6.8) of the Live Update software, introduced multiple security verification mechanisms to prevent any malicious manipulation in the form of software updates or other means, and implemented an enhanced end-to-end encryption mechanism. At the same time, we have also updated and strengthened our server-to-end-user software architecture to prevent similar attacks from happening in the future.
  • The Messy Truth About Infiltrating Computer Supply Chains — The Defense Intelligence Agency believed that China’s capability at exploiting the BIOS “reflects a qualitative leap forward in exploitation that is difficult to detect”
  • Inside the Unnerving CCleaner Supply Chain Attack — Security researchers at Cisco Talos and Morphisec made a worst nightmare-type disclosure: the ubiquitous computer cleanup tool CCleaner had been compromised by hackers for more than a month. The software updates users were downloading from CCleaner owner Avast—a security company itself—had been tainted with a malware backdoor. The incident exposed millions of computers and reinforced the threat of so-called digital supply chain attacks, situations where trusted, widely distributed software is actually infected by malicious code.
  • ShadowPad: How Attackers hide Backdoor in Software used by Hundreds of Large Companies around the World — ShadowPad is an example of how dangerous and wide-scale a successful supply-chain attack can be. Given the opportunities for reach and data collection it gives to the attackers, most likely it will be reproduced again and again with some other widely used software component.
  • Gaming industry still in the scope of attackers in Asia — Yet again, new supply-chain attacks recently caught the attention of ESET Researchers. This time, two games and one gaming platform application were compromised to include a backdoor.
  • Microsoft Security Intelligence Report Volume 24 is now available — Software supply chain attacks are another trend that Microsoft has been tracking for several years. One supply chain tactic used by attackers is to incorporate a compromised component into a legitimate application or update package, which then is distributed to the users via the software. These attacks can be very difficult to detect because they take advantage of the trust that users have in their software vendors. The report includes several examples, including the Dofoil campaign, which illustrates how wide-reaching these types of attacks are and what we are doing to prevent and respond to them.
  • Microsoft Security Intelligence Report Volume 24
  • Supply Chain Attacks Spiked 78 Percent in 2018
  • Supply Chain Security: A Talk by Bunnie Huang — I recently gave an invited talk about supply chain security at BlueHat IL 2019. I was a bit surprised at the level of interest it received, so I thought I’d share it here for people who might have missed it.
  • Attack inception: Compromised supply chain within a supply chain poses new risk — The plot twist: The app vendor’s systems were unaffected. The compromise was traceable instead to a second software vendor that hosted additional packages used by the app during installation. This turned out be an interesting and unique case of an attack involving “the supply chain of the supply chain”.
  • Supply Chain Attacks and Secure Software Updates — In general, a supply chain attack involves first hacking a trusted third party who provides a product or service to your target, and then using your newly acquired, privileged position to compromise your intended target.
  • Bad USB, Very Bad USB — The best defense for this type of attack is to only use devices that do not have reprogrammable firmware. Outside of this, it is important to only use USB drives that you trust completely, because after plugging in an untrusted device, you will never know if there is an invisible threat running on your computer.
  • Reflections on Trusting Trust by Ken Thompson
  • LVFS Project Announcement - The Linux Foundation — The Linux Foundation welcomes the Linux Vendor Firmware Service (LVFS) as a new project. LVFS is a secure website that allows hardware vendors to upload firmware updates. It’s used by all major Linux distributions to provide metadata for clients, such as fwupdmgr, GNOME Software and KDE Discover.
  • LVFS: Vendor Status
  • Two new supply-chain attacks come to light in less than a week — Called “Colourama,” the package looked similar to Colorama, which is one of the top-20 most-downloaded legitimate modules in the Python repository. The doppelgänger Colourama package contained most of the legitimate functions of the legitimate module, with one significant difference: Colourama added code that, when run on Windows servers, installed a Visual Basic script.
  • Malicious code found in npm package event-stream downloaded 8 million times in the past 2.5 months
]]>
https://fireside.fm/player/v2/sHzmXDIv+-mAcxZau ]]> Wes Payne Jim Salter
399: Ethics in AI https://techsnap.systems/399 6a9e036e-abe5-4b0c-b727-2d3dab34ce1d Fri, 15 Mar 2019 19:30:00 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Machine learning promises to change many industries, but with these changes come dangerous new risks. Join Jim and Wes as they explore some of the surprising ways bias can creep in and the serious consequences of ignoring these problems. 38:48 false Machine learning promises to change many industries, but with these changes come dangerous new risks. Join Jim and Wes as they explore some of the surprising ways bias can creep in and the serious consequences of ignoring these problems.

]]>
machine learning, AI, expert systems, supervised learning, unsupervised learning, neural networks, bias, racism, zo, tay, reinforcement learning, python, algorithms, programming, data, privacy, server builds, plaintext offenders, CivicPlus, passwords, computer vision, natural language processing, classification, GloVe, word2vec, scikit-learn, Robyn Speer, ConceptNet, SysAdmin podcast, DevOps, TechSNAP, chatbot Machine learning promises to change many industries, but with these changes come dangerous new risks. Join Jim and Wes as they explore some of the surprising ways bias can creep in and the serious consequences of ignoring these problems.

Links:

  • Microsoft’s neo-Nazi sexbot was a great lesson for makers of AI assistants — What started out as an entertaining social experiment—get regular people to talk to a chatbot so it could learn while they, hopefully, had fun—became a nightmare for Tay’s creators. Users soon figured out how to make Tay say awful things. Microsoft took the chatbot offline after less than a day.
  • Microsoft's Zo chatbot is a politically correct version of her sister Tay—except she’s much, much worse — A few months after Tay’s disastrous debut, Microsoft quietly released Zo, a second English-language chatbot available on Messenger, Kik, Skype, Twitter, and Groupme.
  • How to make a racist AI without really trying | ConceptNet blog — Some people expect that fighting algorithmic racism is going to come with some sort of trade-off. There’s no trade-off here. You can have data that’s better and less racist. You can have data that’s better because it’s less racist. There was never anything “accurate” about the overt racism that word2vec and GloVe learned.
  • Microsoft warned investors that biased or flawed AI could hurt the company’s image — Notably, this addition comes after a research paper by MIT Media Lab graduate researcher Joy Buolamwini showed in February 2018 that Microsoft’s facial recognition algorithm’s was less accurate for women and people of color. In response, Microsoft updated its facial recognition models, and wrote a blog post about how it was addressing bias in its software.
  • AI bias: It is the responsibility of humans to ensure fairness — Amazon recently pulled the plug on its experimental AI-powered recruitment engine when it was discovered that the machine learning technology behind it was exhibiting bias against female applicants.
  • California Police Using AI Program That Tells Them Where to Patrol, Critics Say It May Just Reinforce Racial Bias — “The potential for bias to creep into the deployment of the tools is enormous. Simply put, the devil is in the data,” Vincent Southerland, executive director of the Center on Race, Inequality, and the Law at NYU School of Law, wrote for the American Civil Liberties Union last year.
  • A.I. Could Worsen Health Disparities — A recent study found that some facial recognition programs incorrectly classify less than 1 percent of light-skinned men but more than one-third of dark-skinned women. What happens when we rely on such algorithms to diagnose melanoma on light versus dark skin?
  • Responsible AI Practices — These questions are far from solved, and in fact are active areas of research and development. Google is committed to making progress in the responsible development of AI and to sharing knowledge, research, tools, datasets, and other resources with the larger community. Below we share some of our current work and recommended practices.
  • The Ars Technica System Guide, Winter 2019: The one about the servers — The Winter 2019 Ars System Guide has returned to its roots: showing readers three real-world system builds we like at this precise moment in time. Instead of general performance desktops, this time around we're going to focus specifically on building some servers.
  • Introduction to Python Development at Linux Academy — This course is designed to teach you how to program using Python. We'll cover the building blocks of the language, programming design fundamentals, how to use the standard library, third-party packages, and how to create Python projects. In the end, you should have a grasp of how to program.
]]>
Machine learning promises to change many industries, but with these changes come dangerous new risks. Join Jim and Wes as they explore some of the surprising ways bias can creep in and the serious consequences of ignoring these problems.

Links:

  • Microsoft’s neo-Nazi sexbot was a great lesson for makers of AI assistants — What started out as an entertaining social experiment—get regular people to talk to a chatbot so it could learn while they, hopefully, had fun—became a nightmare for Tay’s creators. Users soon figured out how to make Tay say awful things. Microsoft took the chatbot offline after less than a day.
  • Microsoft's Zo chatbot is a politically correct version of her sister Tay—except she’s much, much worse — A few months after Tay’s disastrous debut, Microsoft quietly released Zo, a second English-language chatbot available on Messenger, Kik, Skype, Twitter, and Groupme.
  • How to make a racist AI without really trying | ConceptNet blog — Some people expect that fighting algorithmic racism is going to come with some sort of trade-off. There’s no trade-off here. You can have data that’s better and less racist. You can have data that’s better because it’s less racist. There was never anything “accurate” about the overt racism that word2vec and GloVe learned.
  • Microsoft warned investors that biased or flawed AI could hurt the company’s image — Notably, this addition comes after a research paper by MIT Media Lab graduate researcher Joy Buolamwini showed in February 2018 that Microsoft’s facial recognition algorithm’s was less accurate for women and people of color. In response, Microsoft updated its facial recognition models, and wrote a blog post about how it was addressing bias in its software.
  • AI bias: It is the responsibility of humans to ensure fairness — Amazon recently pulled the plug on its experimental AI-powered recruitment engine when it was discovered that the machine learning technology behind it was exhibiting bias against female applicants.
  • California Police Using AI Program That Tells Them Where to Patrol, Critics Say It May Just Reinforce Racial Bias — “The potential for bias to creep into the deployment of the tools is enormous. Simply put, the devil is in the data,” Vincent Southerland, executive director of the Center on Race, Inequality, and the Law at NYU School of Law, wrote for the American Civil Liberties Union last year.
  • A.I. Could Worsen Health Disparities — A recent study found that some facial recognition programs incorrectly classify less than 1 percent of light-skinned men but more than one-third of dark-skinned women. What happens when we rely on such algorithms to diagnose melanoma on light versus dark skin?
  • Responsible AI Practices — These questions are far from solved, and in fact are active areas of research and development. Google is committed to making progress in the responsible development of AI and to sharing knowledge, research, tools, datasets, and other resources with the larger community. Below we share some of our current work and recommended practices.
  • The Ars Technica System Guide, Winter 2019: The one about the servers — The Winter 2019 Ars System Guide has returned to its roots: showing readers three real-world system builds we like at this precise moment in time. Instead of general performance desktops, this time around we're going to focus specifically on building some servers.
  • Introduction to Python Development at Linux Academy — This course is designed to teach you how to program using Python. We'll cover the building blocks of the language, programming design fundamentals, how to use the standard library, third-party packages, and how to create Python projects. In the end, you should have a grasp of how to program.
]]>
https://fireside.fm/player/v2/sHzmXDIv+sthWBrFu ]]> Wes Payne Jim Salter
398: Proper Password Procedures https://techsnap.systems/398 9c4e48b3-6aef-470f-82d5-d954c5bca39a Thu, 28 Feb 2019 18:00:00 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting We reveal the shady password practices that are all too common at many utility providers, and hash out why salts are essential to proper password storage. 31:23 false We reveal the shady password practices that are all too common at many utility providers, and hash out why salts are essential to proper password storage.

Plus the benefits of passphrases, and what you can do to keep your local providers on the up and up.

]]>
Passwords, Password Salt, Cryptography, Cryptographic Hash, Utility, power company, SEDC, OWASP, entropy, password manager, plaintext, hashing algorithms, bcrypt, scrypt, pbkdf2, encryption, keepass, lastpass, 1password, offline encryption, PCI-DSS, standards, compliance, ethics, burp intruder, pivot, security, security research, software development, cracking, rainbow tables, brute force, SysAdmin podcast, DevOps, TechSNAP We reveal the shady password practices that are all too common at many utility providers, and hash out why salts are essential to proper password storage.

Plus the benefits of passphrases, and what you can do to keep your local providers on the up and up.

Links:

  • Plain wrong: Millions of utility customers’ passwords stored in plain text | Ars Technica — In September of 2018, an anonymous independent security researcher (who we'll call X) noticed that their power company's website was offering to email—not reset!—lost account passwords to forgetful users. Startled, X fed the online form the utility account number and the last four phone number digits it was asking for. Sure enough, a few minutes later the account password, in plain text, was sitting in X's inbox.
  • The LinkedIn Hack: Understanding Why It Was So Easy to Crack the Passwords | — LinkedIn stated that after the initial 2012 breach, they added enhanced protection, most likely adding the “salt” functionality to their passwords. However, if you have not changed your password since 2012, you do not have the added protection of a salted password hash. You may be asking yourself–what on earth are hashing and salting and how does this all work?
  • How Developers got Password Security so Wrong — As time has gone on; developers have continued to store passwords insecurely, and users have continued to set them weakly. Despite this, no viable alternative has been created for password security.
  • Adding Salt to Hashing: A Better Way to Store Passwords — A salt is added to the hashing process to force their uniqueness, increase their complexity without increasing user requirements, and to mitigate password attacks like rainbow tables.
  • Why Do Developers Get Password Storage Wrong? A Qualitative Usability Study — We were interested in exploring two particular aspects: Firstly, do developers get things wrong because they do not think about security and thus do not include security features (but could if they wanted to)? Or do they write insecure code because the complexity of the task is too great for them? Secondly, a common suggestion to increase security is to offer secure defaults.
  • OWASP Password Storage Cheatsheet — This article provides guidance on properly storing passwords, secret question responses, and similar credential information.
  • Secure Salted Password Hashing - How to do it Properly — If you're a web developer, you've probably had to make a user account system. The most important aspect of a user account system is how user passwords are protected. User account databases are hacked frequently, so you absolutely must do something to protect your users' passwords if your website is ever breached. The best way to protect passwords is to employ salted password hashing. This page will explain why it's done the way it is.
  • Plain Text Offenders — We’re tired of websites abusing our trust and storing our passwords in plain text, exposing us to danger. Here we put websites we believe to be practicing this to shame.
  • Cybersecurity 101: Why you need to use a password manager | TechCrunch — Think of a password manager like a book of your passwords, locked by a master key that only you know.
  • On the Security of Password Managers - Schneier on Security — There's new research on the security of password managers, specifically 1Password, Dashlane, KeePass, and Lastpass. This work specifically looks at password leakage on the host computer. That is, does the password manager accidentally leave plaintext copies of the password lying around memory?
  • LinuxFest Northwest 2019 — It's the 20th anniversary of LinuxFest Northwest! Come join your favorite Jupiter Broadcasting hosts at the Pacific Northwest's premier Linux event.
  • SCALE 17x — The 17th annual Southern California Linux Expo – will take place on March. 7-10, 2019, at the Pasadena Convention Center. SCaLE 17x expects to host 150 exhibitors this year, along with nearly 130 sessions, tutorials and special events.
  • Jupiter Broadcasting Meetups — The best place to find out when Jupiter Broadcasting has a meetup near you! Also stay tuned for upcoming virtual study groups.
]]>
We reveal the shady password practices that are all too common at many utility providers, and hash out why salts are essential to proper password storage.

Plus the benefits of passphrases, and what you can do to keep your local providers on the up and up.

Links:

  • Plain wrong: Millions of utility customers’ passwords stored in plain text | Ars Technica — In September of 2018, an anonymous independent security researcher (who we'll call X) noticed that their power company's website was offering to email—not reset!—lost account passwords to forgetful users. Startled, X fed the online form the utility account number and the last four phone number digits it was asking for. Sure enough, a few minutes later the account password, in plain text, was sitting in X's inbox.
  • The LinkedIn Hack: Understanding Why It Was So Easy to Crack the Passwords | — LinkedIn stated that after the initial 2012 breach, they added enhanced protection, most likely adding the “salt” functionality to their passwords. However, if you have not changed your password since 2012, you do not have the added protection of a salted password hash. You may be asking yourself–what on earth are hashing and salting and how does this all work?
  • How Developers got Password Security so Wrong — As time has gone on; developers have continued to store passwords insecurely, and users have continued to set them weakly. Despite this, no viable alternative has been created for password security.
  • Adding Salt to Hashing: A Better Way to Store Passwords — A salt is added to the hashing process to force their uniqueness, increase their complexity without increasing user requirements, and to mitigate password attacks like rainbow tables.
  • Why Do Developers Get Password Storage Wrong? A Qualitative Usability Study — We were interested in exploring two particular aspects: Firstly, do developers get things wrong because they do not think about security and thus do not include security features (but could if they wanted to)? Or do they write insecure code because the complexity of the task is too great for them? Secondly, a common suggestion to increase security is to offer secure defaults.
  • OWASP Password Storage Cheatsheet — This article provides guidance on properly storing passwords, secret question responses, and similar credential information.
  • Secure Salted Password Hashing - How to do it Properly — If you're a web developer, you've probably had to make a user account system. The most important aspect of a user account system is how user passwords are protected. User account databases are hacked frequently, so you absolutely must do something to protect your users' passwords if your website is ever breached. The best way to protect passwords is to employ salted password hashing. This page will explain why it's done the way it is.
  • Plain Text Offenders — We’re tired of websites abusing our trust and storing our passwords in plain text, exposing us to danger. Here we put websites we believe to be practicing this to shame.
  • Cybersecurity 101: Why you need to use a password manager | TechCrunch — Think of a password manager like a book of your passwords, locked by a master key that only you know.
  • On the Security of Password Managers - Schneier on Security — There's new research on the security of password managers, specifically 1Password, Dashlane, KeePass, and Lastpass. This work specifically looks at password leakage on the host computer. That is, does the password manager accidentally leave plaintext copies of the password lying around memory?
  • LinuxFest Northwest 2019 — It's the 20th anniversary of LinuxFest Northwest! Come join your favorite Jupiter Broadcasting hosts at the Pacific Northwest's premier Linux event.
  • SCALE 17x — The 17th annual Southern California Linux Expo – will take place on March. 7-10, 2019, at the Pasadena Convention Center. SCaLE 17x expects to host 150 exhibitors this year, along with nearly 130 sessions, tutorials and special events.
  • Jupiter Broadcasting Meetups — The best place to find out when Jupiter Broadcasting has a meetup near you! Also stay tuned for upcoming virtual study groups.
]]>
https://fireside.fm/player/v2/sHzmXDIv+SPphsJBz ]]> Wes Payne Jim Salter
397: Quality Tools https://techsnap.systems/397 a6b87767-ad4e-429f-b82a-703023411eb6 Thu, 14 Feb 2019 21:00:00 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Join Jim and Wes as they battle bufferbloat, latency spikes, and network hogs with some of their favorite tools for traffic shaping, firewalling, and QoS. 40:39 false Join Jim and Wes as they battle bufferbloat, latency spikes, and network hogs with some of their favorite tools for traffic shaping, firewalling, and QoS.

Plus the importance of sane defaults and why netdata belongs on every system.

]]>
bitorrent,latency,qos,bandwidth,networking,command line,wondershaper,tc,traffic control,queing discipline,network discipline ,FireHOL,FireQOS,netdata,qdisc,queues,traffic shaping,sane defaults,rate limit,tcp,udp,iptables,firewall,routing,home networking,netdata,monitoring,networking engineering,mpls,vpn,wireguard,openvpn,gre,bufferbloat,munin,nagios,collectd,prometheus, Join Jim and Wes as they battle bufferbloat, latency spikes, and network hogs with some of their favorite tools for traffic shaping, firewalling, and QoS.

Plus the importance of sane defaults and why netdata belongs on every system.

Links:

  • Why you want QoS - Netdata Documentation — One of the features the Linux kernel has, but it is rarely used, is its ability to apply QoS on traffic. Even most interesting is that it can apply QoS to both inbound and outbound traffic.
  • FireQOS Wiki — FireQOS is a helper to assist you configure traffic shaping on Linux.
  • FireHOL - Linux firewalling and traffic shaping for humans — FireHOL is a language (and a program to run it) which builds secure, stateful firewalls from easy to understand, human-readable configurations. The configurations stay readable even for very complex setups.
  • tc(8) man page — Traffic Control consists of the following: SHAPING When traffic is shaped, its rate of transmission is under control. Shaping may be more than lowering the available bandwidth - it is also used to smooth out bursts in traffic for better network behaviour. Shaping occurs on egress. SCHEDULING By scheduling the transmission of packets it is possible to improve interactivity for traffic that needs it while still guaranteeing bandwidth to bulk transfers. Reordering is also called prioritizing, and happens only on egress. POLICING Where shaping deals with transmission of traffic, policing pertains to traffic arriving. Policing thus occurs on ingress. DROPPING Traffic exceeding a set bandwidth may also be dropped forthwith, both on ingress and on egress.
  • Overview of Traffic Control Concepts — Traffic control is the name given to the sets of queuing systems and mechanisms by which packets are received and transmitted on a router. This includes deciding which (and whether) packets to accept at what rate on the input of an interface and determining which packets to transmit in what order at what rate on the output of an interface.
  • Advanced traffic control - ArchWiki
  • Journey to the Center of the Linux Kernel: Traffic Control, Shaping and QoS — This document describes the Traffic Control subsystem of the Linux Kernel in depth, algorithm by algorithm, and shows how it can be used to manage the outgoing traffic of a Linux system.
  • Netdata Real-time performance monitoring, done right! — Netdata is distributed, real-time, performance and health monitoring for systems and applications. It is a highly optimized monitoring agent you install on all your systems and containers.
  • Add more charts to netdata — To collect non-system metrics, netdata supports a plugin architecture.
]]>
Join Jim and Wes as they battle bufferbloat, latency spikes, and network hogs with some of their favorite tools for traffic shaping, firewalling, and QoS.

Plus the importance of sane defaults and why netdata belongs on every system.

Links:

  • Why you want QoS - Netdata Documentation — One of the features the Linux kernel has, but it is rarely used, is its ability to apply QoS on traffic. Even most interesting is that it can apply QoS to both inbound and outbound traffic.
  • FireQOS Wiki — FireQOS is a helper to assist you configure traffic shaping on Linux.
  • FireHOL - Linux firewalling and traffic shaping for humans — FireHOL is a language (and a program to run it) which builds secure, stateful firewalls from easy to understand, human-readable configurations. The configurations stay readable even for very complex setups.
  • tc(8) man page — Traffic Control consists of the following: SHAPING When traffic is shaped, its rate of transmission is under control. Shaping may be more than lowering the available bandwidth - it is also used to smooth out bursts in traffic for better network behaviour. Shaping occurs on egress. SCHEDULING By scheduling the transmission of packets it is possible to improve interactivity for traffic that needs it while still guaranteeing bandwidth to bulk transfers. Reordering is also called prioritizing, and happens only on egress. POLICING Where shaping deals with transmission of traffic, policing pertains to traffic arriving. Policing thus occurs on ingress. DROPPING Traffic exceeding a set bandwidth may also be dropped forthwith, both on ingress and on egress.
  • Overview of Traffic Control Concepts — Traffic control is the name given to the sets of queuing systems and mechanisms by which packets are received and transmitted on a router. This includes deciding which (and whether) packets to accept at what rate on the input of an interface and determining which packets to transmit in what order at what rate on the output of an interface.
  • Advanced traffic control - ArchWiki
  • Journey to the Center of the Linux Kernel: Traffic Control, Shaping and QoS — This document describes the Traffic Control subsystem of the Linux Kernel in depth, algorithm by algorithm, and shows how it can be used to manage the outgoing traffic of a Linux system.
  • Netdata Real-time performance monitoring, done right! — Netdata is distributed, real-time, performance and health monitoring for systems and applications. It is a highly optimized monitoring agent you install on all your systems and containers.
  • Add more charts to netdata — To collect non-system metrics, netdata supports a plugin architecture.
]]>
https://fireside.fm/player/v2/sHzmXDIv+1ihx2pgm ]]> Wes Payne Jim Salter
396: Floating Point Problems https://techsnap.systems/396 bc968a3f-c804-4203-ae2b-dc43ef919218 Thu, 31 Jan 2019 20:45:00 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Jim and Wes are joined by OpenZFS developer Richard Yao to explain why the recent drama over Linux kernel 5.0 is no big deal, and how his fix for the underlying issue might actually make things faster. 27:11 false Jim and Wes are joined by OpenZFS developer Richard Yao to explain why the recent drama over Linux kernel 5.0 is no big deal, and how his fix for the underlying issue might actually make things faster.

Plus the nitty-gritty details of vectorized optimizations and kernel preemption, and our thoughts on the future of the relationship between ZFS and Linux.

Special Guest: Richard Yao.

]]>
GPL, CDDL, Oracle, FPU, SIMD, vectorized instructions, AVX, hardware acceleration, journaling, data integrity, LFNW, floating point, checksum, snapshot, clone, FreeBSD, kernel module, header, software license, Linux, Multitasking, kernel preemption, OpenZFS, ZFS, ZoL, ZFS on Linux, Storage, RAID, ZVOL, SysAdmin podcast, DevOps, TechSNAP Jim and Wes are joined by OpenZFS developer Richard Yao to explain why the recent drama over Linux kernel 5.0 is no big deal, and how his fix for the underlying issue might actually make things faster.

Plus the nitty-gritty details of vectorized optimizations and kernel preemption, and our thoughts on the future of the relationship between ZFS and Linux.

Special Guest: Richard Yao.

Links:

  • LinuxFest Northwest 2019 — Join a bunch of JB hosts and community celebrating the 20th anniversary!
  • Choose Linux — The show that captures the excitement of discovering Linux.
  • Linux 5.0: _kernel_fpu{begin,end} no longer exported — The latest kernels removed the old compatibility headers.
  • ZFS On Linux Landing Workaround For Linux 5.0 Kernel Support — So while these symbols are important for SIMD vectorized checksums for ZFS in the name of performance, with Linux 5.0+ they are not going to be exported for use by non-GPL modules. ZFS On Linux developer Tony Hutter has now staged a change that would disable vector instructions on Linux 5.0+ kernels.
  • Re: x86/fpu: Don't export __kernel_fpu_{begin,end}() — My tolerance for ZFS is pretty non-existant. Sun explicitly did not want their code to work on Linux, so why would we do extra work to get their code to work properly?
  • The future of ZFS in FreeBSD — This state of affairs has led to a general agreement among the stakeholders that I have spoken to that it makes sense to rebase FreeBSD's ZFS on ZoL. Brian Behlendorf has graciously encouraged me to add FreeBSD support directly so that we might all have a singleshared code base.
  • Dephix: Kickoff to The Future — OpenZFS has grown over the last decade, and delivering our application on Linux provides great OpenZFS support while enabling higher velocity adoption of new environments.
  • The future of ZFS on Linux [zfs-discuss] — Do you realize that we don’t actually need the symbols that the kernel removed. It All they do is save/restore of register state while turning off/on preemption. Nothing stops us from doing that ourselves. It is possible to implement our own substitutes using code from either Illumos or FreeBSD or even write our own. Honestly, I am beginning to think that my attempt to compromise with mainline gave the wrong impression. I am simply tired of this behavior by them and felt like reaching out to put an end to it. In a few weeks, we will likely be running on Linux 5.0 as if those symbols had never been removed because we will almost certainly have our own substitutes for them. Having to bloat our code because mainline won’t give us access to trivial functionality is annoying, but it is not the end of the world.
  • LINUX Unplugged Episode 284: Free as in Get Out
  • BSD Now 279: Future of ZFS
  • BSD Now 157: ZFS, The “Universal” File-system
]]>
Jim and Wes are joined by OpenZFS developer Richard Yao to explain why the recent drama over Linux kernel 5.0 is no big deal, and how his fix for the underlying issue might actually make things faster.

Plus the nitty-gritty details of vectorized optimizations and kernel preemption, and our thoughts on the future of the relationship between ZFS and Linux.

Special Guest: Richard Yao.

Links:

  • LinuxFest Northwest 2019 — Join a bunch of JB hosts and community celebrating the 20th anniversary!
  • Choose Linux — The show that captures the excitement of discovering Linux.
  • Linux 5.0: _kernel_fpu{begin,end} no longer exported — The latest kernels removed the old compatibility headers.
  • ZFS On Linux Landing Workaround For Linux 5.0 Kernel Support — So while these symbols are important for SIMD vectorized checksums for ZFS in the name of performance, with Linux 5.0+ they are not going to be exported for use by non-GPL modules. ZFS On Linux developer Tony Hutter has now staged a change that would disable vector instructions on Linux 5.0+ kernels.
  • Re: x86/fpu: Don't export __kernel_fpu_{begin,end}() — My tolerance for ZFS is pretty non-existant. Sun explicitly did not want their code to work on Linux, so why would we do extra work to get their code to work properly?
  • The future of ZFS in FreeBSD — This state of affairs has led to a general agreement among the stakeholders that I have spoken to that it makes sense to rebase FreeBSD's ZFS on ZoL. Brian Behlendorf has graciously encouraged me to add FreeBSD support directly so that we might all have a singleshared code base.
  • Dephix: Kickoff to The Future — OpenZFS has grown over the last decade, and delivering our application on Linux provides great OpenZFS support while enabling higher velocity adoption of new environments.
  • The future of ZFS on Linux [zfs-discuss] — Do you realize that we don’t actually need the symbols that the kernel removed. It All they do is save/restore of register state while turning off/on preemption. Nothing stops us from doing that ourselves. It is possible to implement our own substitutes using code from either Illumos or FreeBSD or even write our own. Honestly, I am beginning to think that my attempt to compromise with mainline gave the wrong impression. I am simply tired of this behavior by them and felt like reaching out to put an end to it. In a few weeks, we will likely be running on Linux 5.0 as if those symbols had never been removed because we will almost certainly have our own substitutes for them. Having to bloat our code because mainline won’t give us access to trivial functionality is annoying, but it is not the end of the world.
  • LINUX Unplugged Episode 284: Free as in Get Out
  • BSD Now 279: Future of ZFS
  • BSD Now 157: ZFS, The “Universal” File-system
]]>
https://fireside.fm/player/v2/sHzmXDIv+qCMCvagb ]]> Wes Payne Jim Salter Richard Yao
395: The ACME Era https://techsnap.systems/395 26a02c39-f731-48d1-9539-2d910465a6f7 Sun, 20 Jan 2019 20:45:00 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting We welcome Jim to the show, and he and Wes dive deep into all things Let’s Encrypt. 33:21 false We welcome Jim to the show, and he and Wes dive deep into all things Let’s Encrypt.

The history, the clients, and the from-the-field details you'll want to know.

]]>
SSL, TLS, public key cryptography. X.509, EV, DV, Domain Verification, Extended Verification, StartSSL, CSR, SSL certificates, TLS certificates, BGP, ACME, Let’s Encrypt, Certbot, Mozilla, EFF, Automation, NGINX, Apache, Traefik, caddy, DNS, HTTP, HTTPS, Encryption, ISRG, TLS-SNI-01, ACME V2, Mail Server, Exim, Dovecot, Postfix, IETF, Security, Networking, SysAdmin podcast, DevOps, TechSNAP We welcome Jim to the show, and he and Wes dive deep into all things Let’s Encrypt.

The history, the clients, and the from-the-field details you'll want to know.

Links:

]]>
We welcome Jim to the show, and he and Wes dive deep into all things Let’s Encrypt.

The history, the clients, and the from-the-field details you'll want to know.

Links:

]]>
https://fireside.fm/player/v2/sHzmXDIv+uk9g_0rh ]]> Jim Salter Wes Payne
394: All About Azure https://techsnap.systems/394 2e588701-e7a1-4462-99fa-e7ea2275b375 Thu, 10 Jan 2019 04:00:00 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Wes is joined by a special guest to take a look back on the growth and development of Azure in 2018 and discuss some of its unique strengths. 26:09 false Wes is joined by a special guest to take a look back on the growth and development of Azure in 2018 and discuss some of its unique strengths.

Special Guest: Chad M. Crowell.

]]>
Azure, Microsoft, AWS, Cloud, command line, virtualization, Hybrid Cloud, Active Directory, VPC, VPN, Powershell, Powershell core, Azure Sphere, Azure Stack, File Sync, MSSQL, Windows, Linux, Security, Networking, SysAdmin podcast, DevOps, TechSNAP Wes is joined by a special guest to take a look back on the growth and development of Azure in 2018 and discuss some of its unique strengths.

Special Guest: Chad M. Crowell.

Links:

]]>
Wes is joined by a special guest to take a look back on the growth and development of Azure in 2018 and discuss some of its unique strengths.

Special Guest: Chad M. Crowell.

Links:

]]>
https://fireside.fm/player/v2/sHzmXDIv+C8yRYQ23 ]]> Wes Payne Chad M. Crowell
393: Back to our /roots https://techsnap.systems/393 1126dc11-7156-4c4d-84f1-a9aa9bf4ebcf Thu, 03 Jan 2019 04:00:00 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting In a special new year’s episode we take a moment to reflect on the show’s past, its future, and say goodbye to an old friend. 22:22 false In a special new year’s episode we take a moment to reflect on the show’s past, its future, and say goodbye to an old friend.

]]>
Security Breach, Flash, AWS, Cloud, Bitcoin, Dropbox, Sony, PSN Breach, Wordpress, SSL, TLS, Allan Jude, FreeBSD, Jim Salter, Information Density, Automation, Bitcoin, Security, Networking, SysAdmin podcast, DevOps, TechSNAP In a special new year’s episode we take a moment to reflect on the show’s past, its future, and say goodbye to an old friend.

Links:

]]>
In a special new year’s episode we take a moment to reflect on the show’s past, its future, and say goodbye to an old friend.

Links:

]]>
https://fireside.fm/player/v2/sHzmXDIv+tzeg1QI9 ]]> Chris Fisher Wes Payne
392: Keeping up with Kubernetes https://techsnap.systems/392 45523a8f-70a8-4800-a757-964c8f91f645 Wed, 12 Dec 2018 19:00:00 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting A security vulnerability in Kubernetes causes a big stir, but we’ll break it all down and explain what went wrong. 27:28 false A security vulnerability in Kubernetes causes a big stir, but we’ll break it all down and explain what went wrong.

Plus the biggest stories out of Kubecon, and serverless gets serious.

]]>
Kubecon, Kubernetes, Istio, CNCF, etcd, traefik, knative, google, k8s, red hat, ibm, openwhisk, serverless, faas, rook, cloud native, storage, ceph, Helm, Helm hub, Elasticsearch, Chromium OS, Chromium, Event driven, CloudEvent, Containers, Container Vulnerability, GitLab, Crossplane, Control Plane, Multicloud, holiday, christmas, security.christmas, CVE, Security Vulnerability, CVE-2018-1002105, kube-apiserver, websocket, RBAC, HTTP, metrics, Security, Networking, SysAdmin podcast, DevOps, TechSNAP A security vulnerability in Kubernetes causes a big stir, but we’ll break it all down and explain what went wrong.

Plus the biggest stories out of Kubecon, and serverless gets serious.

Links:

]]>
A security vulnerability in Kubernetes causes a big stir, but we’ll break it all down and explain what went wrong.

Plus the biggest stories out of Kubecon, and serverless gets serious.

Links:

]]>
https://fireside.fm/player/v2/sHzmXDIv+1ykx1nbu ]]> Chris Fisher Wes Payne
Episode 391: Firecracker Fundamentals https://techsnap.systems/391 85bdbb45-28a2-4d50-bed1-ade6768e3fa3 Thu, 29 Nov 2018 14:00:00 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting We break down Firecracker Amazon’s new open source kvm powered, virtual machine monitor, and explore what makes it different than the options on the market now. 21:17 false We break down Firecracker Amazon’s new open source kvm powered, virtual machine monitor, and explore what makes it different from the options on the market now.

Plus some good news for OpenBGP and the wider internet community, and a handy tool for inspecting docker images.

]]>
Firecracker, AWS, Amazon, Serverless, Lambda, Fargate, QEMU, KVM, Virtualization, Virtual Machines, VENOM, Rust, BGP, OpenBSD, RPKI, MITM, dive, Docker, evilginx2, proxy, Sennheiser, TLS, SSL, OpenBGPD, RIPE, LSI, RAID, Allan Jude, Security, Networking, SysAdmin podcast, DevOps, TechSNAP We break down Firecracker Amazon’s new open source kvm powered, virtual machine monitor, and explore what makes it different from the options on the market now.

Plus some good news for OpenBGP and the wider internet community, and a handy tool for inspecting docker images.

Links:

]]>
We break down Firecracker Amazon’s new open source kvm powered, virtual machine monitor, and explore what makes it different from the options on the market now.

Plus some good news for OpenBGP and the wider internet community, and a handy tool for inspecting docker images.

Links:

]]>
https://fireside.fm/player/v2/sHzmXDIv+1YKAOLS4 ]]> Chris Fisher Wes Payne
Episode 390: What’s Up with WireGuard https://techsnap.systems/390 6cd3cd3c-79c7-4978-8102-042f935a1344 Thu, 22 Nov 2018 10:30:00 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting WireGuard has a lot of buzz around it and for many good reasons. We’ll explain what WireGuard is specifically, what it can do, and maybe more importantly, what it can’t. 34:55 false WireGuard has a lot of buzz around it and for many good reasons. We’ll explain what WireGuard is specifically, what it can do, and maybe more importantly, what it can’t.

Special Guest: Jim Salter.

]]>
WireGuard, VPN, IPSEC, Linux, Algo, Private Networking, Jim Salter, ssh, Security, Networking, SysAdmin podcast, DevOps, TechSNAP WireGuard has a lot of buzz around it and for many good reasons. We’ll explain what WireGuard is specifically, what it can do, and maybe more importantly, what it can’t.

Special Guest: Jim Salter.

Links:

]]>
WireGuard has a lot of buzz around it and for many good reasons. We’ll explain what WireGuard is specifically, what it can do, and maybe more importantly, what it can’t.

Special Guest: Jim Salter.

Links:

]]>
https://fireside.fm/player/v2/sHzmXDIv+tQJRK2Vk ]]> Chris Fisher Wes Payne Jim Salter
Episode 389: The Future of HTTP https://techsnap.systems/389 a3776de2-0fab-45fc-8d29-dcd0f2e6da03 Thu, 15 Nov 2018 15:00:00 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Wes is joined by special guest Jim Salter to discuss Google's recent BGP outage and the future of HTTP. 43:46 false Wes is joined by special guest Jim Salter to discuss Google's recent BGP outage and the future of HTTP.

Plus the latest router botnet, why you should never go full UPnP, and the benefits of building your own home router.

Special Guest: Jim Salter.

]]>
BGP, Google, MainOne, China Telecom, BGP Security, RPKI, BGP Leak, BGP Hijack, HTTP, TLS, QUIC, HTTP/3, Encryption, UDP, Spam, Router, UPnP, Botnet, Broadcom, BCMUPnP_Hunter, format string vulnerability, HTTP-over-QUIC, Router Security, WireGuard, Homebrew Router, Wifi, Jim Salter, Ars Technica, Sanoid, Security, Networking, SysAdmin, DevOps, TechSNAP Wes is joined by special guest Jim Salter to discuss Google's recent BGP outage and the future of HTTP.

Plus the latest router botnet, why you should never go full UPnP, and the benefits of building your own home router.

Special Guest: Jim Salter.

Links:

]]>
Wes is joined by special guest Jim Salter to discuss Google's recent BGP outage and the future of HTTP.

Plus the latest router botnet, why you should never go full UPnP, and the benefits of building your own home router.

Special Guest: Jim Salter.

Links:

]]>
https://fireside.fm/player/v2/sHzmXDIv+CplqmecB ]]> Wes Payne Jim Salter
Episode 388: The One About eBPF https://techsnap.systems/388 64a6b392-dd6b-4be1-805a-e88b17e029ec Thu, 25 Oct 2018 15:00:00 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting We explain what eBPF is, how it works, and its proud BSD production legacy. 36:57 false We explain what eBPF is, how it works, and its proud BSD production legacy.

eBPF is a technology that you’re going to be hearing more and more about. It powers low-overhead custom analysis tools, handles network security in a containerized world, and powers tools you use every day.

]]>
MeetBSD, BPF, eBPF, Linux, LWN, Linus, seccomp, XDP, bpfilter, virtual machine, tracing, observability, bcc, bpftrace, dtrace, monitoring, bytecode, up, ultimate plumber, pipecut, networking, security, containers, kernel, shell, pipeline, instrumentation, kprobe, tcpdump, SysAdmin, DevOps, TechSNAP We explain what eBPF is, how it works, and its proud BSD production legacy.

eBPF is a technology that you’re going to be hearing more and more about. It powers low-overhead custom analysis tools, handles network security in a containerized world, and powers tools you use every day.

Links:

]]>
We explain what eBPF is, how it works, and its proud BSD production legacy.

eBPF is a technology that you’re going to be hearing more and more about. It powers low-overhead custom analysis tools, handles network security in a containerized world, and powers tools you use every day.

Links:

]]>
https://fireside.fm/player/v2/sHzmXDIv+WV9aeyvB ]]> Chris Fisher Wes Payne
Episode 387: Private Cloud Building Blocks https://techsnap.systems/387 c6e35c4d-a8a5-4394-8e7f-9acd91aa5aa2 Thu, 11 Oct 2018 17:45:00 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting We bring in Amy Marrich to break down the building blocks of OpenStack. There are nearly an overwhelming number of ways to manage your infrastructure, and we learn about one of the original tools. 33:37 false We bring in Amy Marrich to break down the building blocks of OpenStack. There are nearly an overwhelming number of ways to manage your infrastructure, and we learn about one of the original tools.

Plus a few warm up stories, a war story, and more.

Special Guest: Amy Marrich.

]]>
IPFS, Phishing, RFC, Uber, Writing Things Down, Kata Containers, Containers, Kubernetes, CRI, Private Cloud, OpenStack, Rocky, Zun, Zuul, Magnum, Ansible, Amy Marrich, SysAdmin, Rachel Kroll, OpenStack Training Artichect, TechSNAP We bring in Amy Marrich to break down the building blocks of OpenStack. There are nearly an overwhelming number of ways to manage your infrastructure, and we learn about one of the original tools.

Plus a few warm up stories, a war story, and more.

Special Guest: Amy Marrich.

Links:

]]>
We bring in Amy Marrich to break down the building blocks of OpenStack. There are nearly an overwhelming number of ways to manage your infrastructure, and we learn about one of the original tools.

Plus a few warm up stories, a war story, and more.

Special Guest: Amy Marrich.

Links:

]]>
https://fireside.fm/player/v2/sHzmXDIv+ORFy7i_n ]]> Chris Fisher Wes Payne Amy Marrich
Episode 386: What Makes Google Cloud Different https://techsnap.systems/386 18d614a8-cc5e-47e9-9cad-3f411f1ae0cd Thu, 04 Oct 2018 16:45:00 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting We bring on our Google Cloud expert and explore the fundamentals, demystify some of the magic, and ask what makes Google Cloud different. 34:57 false We bring on our Google Cloud expert and explore the fundamentals, demystify some of the magic, and ask what makes Google Cloud different.

Plus how Google hopes Roughtime will solve one of the web’s biggest problems, some great emails, and more!

Special Guest: Matt Ulasien.

]]>
Roughtime, NTP, Timekeeping, Google Cloud, Container Security, Cloud Build, IoT, Kubernetes, KubeSpy, KubeDirector, Bare Metal Kubernetes, Matt Ulasien, SysAdmin Podcast, TechSNAP We bring on our Google Cloud expert and explore the fundamentals, demystify some of the magic, and ask what makes Google Cloud different.

Plus how Google hopes Roughtime will solve one of the web’s biggest problems, some great emails, and more!

Special Guest: Matt Ulasien.

Links:

]]>
We bring on our Google Cloud expert and explore the fundamentals, demystify some of the magic, and ask what makes Google Cloud different.

Plus how Google hopes Roughtime will solve one of the web’s biggest problems, some great emails, and more!

Special Guest: Matt Ulasien.

Links:

]]>
https://fireside.fm/player/v2/sHzmXDIv+CAWnZ9ev ]]> Chris Fisher Wes Payne Matt Ulasien
Episode 385: 3 Things to Know About Kubernetes https://techsnap.systems/385 f656bfc9-76fe-45b3-b238-3cff6b0acfac Thu, 27 Sep 2018 16:15:00 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Kubernetes expert Will Boyd joins us to explain the top 3 things to know about Kubernetes, when it’s the right tool for the job, and building highly available production grade clusters. 23:09 false Kubernetes expert Will Boyd joins us to explain the top 3 things to know about Kubernetes, when it’s the right tool for the job, and building highly available production grade clusters.

Plus the privacy improvements that could be coming to HTTPS, and a new SSH auditing tool hits the open source scene.

Special Guest: Will Boyd.

]]>
HASSH, SSH, ESNI, SNI, HTTPS, Cloudflare, Salesforce, Kubernetes, Clonezilla, Kubernetes the hard way, Minikube, kubeadm, Will Boyd, Sysadmin Podcast, TechSNAP Kubernetes expert Will Boyd joins us to explain the top 3 things to know about Kubernetes, when it’s the right tool for the job, and building highly available production grade clusters.

Plus the privacy improvements that could be coming to HTTPS, and a new SSH auditing tool hits the open source scene.

Special Guest: Will Boyd.

Links:

]]>
Kubernetes expert Will Boyd joins us to explain the top 3 things to know about Kubernetes, when it’s the right tool for the job, and building highly available production grade clusters.

Plus the privacy improvements that could be coming to HTTPS, and a new SSH auditing tool hits the open source scene.

Special Guest: Will Boyd.

Links:

]]>
https://fireside.fm/player/v2/sHzmXDIv+sk0gDc4F ]]> Chris Fisher Wes Payne Will Boyd
Episode 384: Interplanetary Peers https://techsnap.systems/384 be1b2668-8b45-4297-8043-0f6108bcfe71 Fri, 21 Sep 2018 00:00:00 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Jon the Nice Guy joins Wes to discuss all things IPFS. We'll explore what it does, how it works, and why it might be the best hope for a decentralized internet. 37:14 false Jon the Nice Guy joins Wes to discuss all things IPFS. We'll explore what it does, how it works, and why it might be the best hope for a decentralized internet.

Plus, Magecart strikes again, Alpine has package problems, and why you shouldn't trust Western Digital's MyCloud.

Special Guest: Jon Spriggs.

]]>
GovPayNow, Government Payment Service, Data Breach, Magecart, Payment Systems, Javascript, Newegg, WD My Cloud, Western Digital, IPFS, Interplanetary Filesystem, IPNS, DNSLink, Content-addressable storage, Decentralization, Decentralized Storage, Filesystems, Peer-to-Peer, Cloudflare, OrbitDB, Filecoin, Alpine Linux, Docker, DevOps, Sysadmin, Podcast Jon the Nice Guy joins Wes to discuss all things IPFS. We'll explore what it does, how it works, and why it might be the best hope for a decentralized internet.

Plus, Magecart strikes again, Alpine has package problems, and why you shouldn't trust Western Digital's MyCloud.

Special Guest: Jon Spriggs.

Links:

]]>
Jon the Nice Guy joins Wes to discuss all things IPFS. We'll explore what it does, how it works, and why it might be the best hope for a decentralized internet.

Plus, Magecart strikes again, Alpine has package problems, and why you shouldn't trust Western Digital's MyCloud.

Special Guest: Jon Spriggs.

Links:

]]>
https://fireside.fm/player/v2/sHzmXDIv+7JtMnFZQ ]]> Wes Payne Jon Spriggs
Episode 383: The Power of Shame https://techsnap.systems/383 8012b7a1-2660-4bbc-8dda-a09c631b57ab Thu, 13 Sep 2018 21:30:00 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting TechSNAP progenitor and special guest Allan Jude joins us to talk mobile security, hand out some SSH tips and tricks, and discuss why security shaming works so well. 51:48 false TechSNAP progenitor and special guest Allan Jude joins us to talk mobile security, hand out some SSH tips and tricks, and discuss why security shaming works so well.

Plus, how Mozilla is protecting their GitHub repos, a check-in on Equifax, and some great picks.

Special Guest: Allan Jude.

]]>
Mozilla, GitHub, Javascript, Supply Chain, British Airways, Equifax, SSH, SSH Forwarding, Security Shaming, Project Verify, 2FA, Apple, CSV, SQL, Sysadmin, Devops, Podcast TechSNAP progenitor and special guest Allan Jude joins us to talk mobile security, hand out some SSH tips and tricks, and discuss why security shaming works so well.

Plus, how Mozilla is protecting their GitHub repos, a check-in on Equifax, and some great picks.

Special Guest: Allan Jude.

Links:

]]>
TechSNAP progenitor and special guest Allan Jude joins us to talk mobile security, hand out some SSH tips and tricks, and discuss why security shaming works so well.

Plus, how Mozilla is protecting their GitHub repos, a check-in on Equifax, and some great picks.

Special Guest: Allan Jude.

Links:

]]>
https://fireside.fm/player/v2/sHzmXDIv+-bgnQyhT ]]> Wes Payne Allan Jude
Episode 382: Domestic Disappointments https://techsnap.systems/382 20c841ff-5ccf-4058-8e2d-f59364827c26 Thu, 06 Sep 2018 19:15:00 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting We’re joined by a special guest to discuss the failures of campaign security, the disastrous consequences of a mismanaged firewall, and the suspicious case of Speck. 44:56 true We’re joined by a special guest to discuss the failures of campaign security, the disastrous consequences of a mismanaged firewall, and the suspicious case of Speck.

Plus the latest vulnerabilities in Wireshark and OpenSSH, the new forensic hotness from Netflix, and some great introductions to cryptography.

Special Guest: Martin Wimpress.

]]>
eMail, Elections, Election Security, Espionage, Attachments, Security Keys, CIA, USA, Firewall, China, NSA, Speck, Android, Google, OpenSSH, SSH, Wireshark, CVE, CVSS, Security, TCP, ISP, BGP, 500 mile email, TCP RST, Diffy, Netflix, crypto, cryptography, diffy, netflix, manga, linux, devops, podcast We’re joined by a special guest to discuss the failures of campaign security, the disastrous consequences of a mismanaged firewall, and the suspicious case of Speck.

Plus the latest vulnerabilities in Wireshark and OpenSSH, the new forensic hotness from Netflix, and some great introductions to cryptography.

Special Guest: Martin Wimpress.

Links:

]]>
We’re joined by a special guest to discuss the failures of campaign security, the disastrous consequences of a mismanaged firewall, and the suspicious case of Speck.

Plus the latest vulnerabilities in Wireshark and OpenSSH, the new forensic hotness from Netflix, and some great introductions to cryptography.

Special Guest: Martin Wimpress.

Links:

]]>
https://fireside.fm/player/v2/sHzmXDIv+qoLSHzgo ]]> Wes Payne Martin Wimpress
Episode 381: Here Comes Cloud DNS https://techsnap.systems/381 c8862a6f-bc3a-42f5-b1ff-c9e6282ed771 Wed, 29 Aug 2018 15:45:00 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting To make DNS more secure, we must move it to the cloud! At least that’s what Mozilla and Google suggest. We breakdown DNS-over-HTTPS, why it requires a “cloud” component, and the advantages it has over traditional DNS. 23:53 false To make DNS more secure, we must move it to the cloud! At least that’s what Mozilla and Google suggest. We breakdown DNS-over-HTTPS, why it requires a “cloud” component, and the advantages it has over traditional DNS.

Plus new active attacks against Apache Struts, and a Windows 10 zero-day exposed on Twitter.

]]>
DoH, DNS Over Https, Cloudflare, Cloudflare Resolver, Windows 10, Mozilla, Struts, Apache, CVE-2018-11776, Zero-Day, SandboxEscaper, Netdata, Advanced Local Procedure Call, Sysadmin podcast, techsnap To make DNS more secure, we must move it to the cloud! At least that’s what Mozilla and Google suggest. We breakdown DNS-over-HTTPS, why it requires a “cloud” component, and the advantages it has over traditional DNS.

Plus new active attacks against Apache Struts, and a Windows 10 zero-day exposed on Twitter.

Sponsored By:

Links:

]]>
To make DNS more secure, we must move it to the cloud! At least that’s what Mozilla and Google suggest. We breakdown DNS-over-HTTPS, why it requires a “cloud” component, and the advantages it has over traditional DNS.

Plus new active attacks against Apache Struts, and a Windows 10 zero-day exposed on Twitter.

Sponsored By:

Links:

]]>
https://fireside.fm/player/v2/sHzmXDIv+Qqn7_NxW ]]> Chris Fisher Wes Payne
Episode 380: Terminal Fault https://techsnap.systems/380 44b08775-8ecf-4c05-a1a7-a0888abfaadc Thu, 16 Aug 2018 16:30:00 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Microsoft’s making radical changes to Windows 10, and a new type of speculative execution attack on Intel’s processors is targeting cloud providers. 32:31 false Microsoft’s making radical changes to Windows 10, and a new type of speculative execution attack on Intel’s processors is targeting cloud providers.

]]>
Meltdown, Speculative Execution, Foreshadow, L1TF, Spectre, Page Tables, CPU, Intel, L1 Cache, L1 Terminal Fault, Cabot, Nagios, Windows, SMS, Two Factor Auth, Windows, Windows Console, ConPTY, InPrivate, PTY, SGX, Virtualization, Hyperthreading, sysadmin podcast, techsnap Microsoft’s making radical changes to Windows 10, and a new type of speculative execution attack on Intel’s processors is targeting cloud providers.

Sponsored By:

Links:

]]>
Microsoft’s making radical changes to Windows 10, and a new type of speculative execution attack on Intel’s processors is targeting cloud providers.

Sponsored By:

Links:

]]>
https://fireside.fm/player/v2/sHzmXDIv+pns0pR5V ]]> Chris Fisher Wes Payne
Episode 379: SegmentSmack is Whack https://techsnap.systems/379 7165f792-e1bf-4676-9d9e-2a2cc981db5c Fri, 10 Aug 2018 14:30:00 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Take down a Linux or FreeBSD box with just 2kpps of traffic, own Homebrew in 30 minutes, and infiltrate an entire network via the Inkjet printers. 29:16 false Take down a Linux or FreeBSD box with just 2kpps of traffic, own Homebrew in 30 minutes, and infiltrate an entire network via the Inkjet printers.

It’s a busy TechSNAP week.

]]>
SegmentSmack, FreeBSD, Linux, UEFI remote attack, Buffer overflow, GitHub Audit, TruffleHog, GitRob, undersea datacenter, homebrew, Eric Holmes, Sysadmin podcast, TechSNAP Take down a Linux or FreeBSD box with just 2kpps of traffic, own Homebrew in 30 minutes, and infiltrate an entire network via the Inkjet printers.

It’s a busy TechSNAP week.

Sponsored By:

Links:

]]>
Take down a Linux or FreeBSD box with just 2kpps of traffic, own Homebrew in 30 minutes, and infiltrate an entire network via the Inkjet printers.

It’s a busy TechSNAP week.

Sponsored By:

Links:

]]>
https://fireside.fm/player/v2/sHzmXDIv+9aq7hcRn ]]> Chris Fisher Wes Payne
Episode 378: Two-Factor Fraud https://techsnap.systems/378 3ec742ee-24f7-4eee-a5a0-c40c5248e31b Thu, 02 Aug 2018 18:30:00 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Reddit’s Two Factor procedures fail, while Google’s prevents years of attacks. We’ll look at the different approaches, and discuss the fundamental weakness of Reddit’s approach. 31:56 false Reddit’s Two Factor procedures fail, while Google’s prevents years of attacks. We’ll look at the different approaches, and discuss the fundamental weakness of Reddit’s approach.

Plus a Spectre attack over the network, BGP issues take out Telegram, and more!

]]>
Spectre, NetSpectre, Verizon leak, S3, NICE, BGP, Telegram, Duo Security, Cisco, Two-Factor Authentication, SMS, Sysadmin Podcast, TechSNAP Reddit’s Two Factor procedures fail, while Google’s prevents years of attacks. We’ll look at the different approaches, and discuss the fundamental weakness of Reddit’s approach.

Plus a Spectre attack over the network, BGP issues take out Telegram, and more!

Sponsored By:

Links:

]]>
Reddit’s Two Factor procedures fail, while Google’s prevents years of attacks. We’ll look at the different approaches, and discuss the fundamental weakness of Reddit’s approach.

Plus a Spectre attack over the network, BGP issues take out Telegram, and more!

Sponsored By:

Links:

]]>
https://fireside.fm/player/v2/sHzmXDIv+XFXy1OoK ]]> Chris Fisher Wes Payne
Episode 377: Linux Under Pressure https://techsnap.systems/377 01754d0c-6956-4f6e-a545-e7ec9f178bb5 Wed, 01 Aug 2018 10:30:00 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Some new tools will give you better insights into your system under extreme load, and we flash back to the days of AOL and discuss the new way social hackers are spreading malware. 29:15 false Some new tools will give you better insights into your system under extreme load, and we flash back to the days of AOL and discuss the new way social hackers are spreading malware.

Plus the death of a TLD, the return of SamSam, and more!

]]>
PSI, oomd, Facebook, out-of-memory, oom, SamSam, Ransomeware, Malware, cryptoware, Open source Jobs, Sysadmin Podcast, TechSNAP Some new tools will give you better insights into your system under extreme load, and we flash back to the days of AOL and discuss the new way social hackers are spreading malware.

Plus the death of a TLD, the return of SamSam, and more!

Sponsored By:

Links:

  • psi: pressure stall information for CPU, memory, and IO v2 — PSI aggregates and reports the overall wallclock time in which the tasks in a system (or cgroup) wait for contended hardware resources.
  • Chinese “hackers” are sending malware via snail mail — The trick is simple: a package arrives with a Chinese postmark containing a rambling message and a small CD. The CD, in turn, contains a set of Word files that include script-based malware. These scripts run when the victims access them on their computers, presumably resulting in compromised systems.
  • The death of a TLD
  • SamSam: The (almost) $6 million ransomware — Through original analysis, interviews and research, and by collaborating closely with industry partners and a specialist cryptocurrency monitoring organisation, Sophos has uncovered new details about how the secretive and sophisticated SamSam ransomware is used, who’s been targeted, how it works and how it’s evolving.
  • Open sourcing oomd, a new approach to handling OOMs — As our infrastructure has scaled, we’ve found that an increasing fraction of our machines and networks span multiple generations. One side effect of this multigenerational production environment is that a new software release or configuration change might result in a system running healthily on one machine but experiencing an out-of-memory (OOM) issue on another.
  • Tyler's recent job story
]]>
Some new tools will give you better insights into your system under extreme load, and we flash back to the days of AOL and discuss the new way social hackers are spreading malware.

Plus the death of a TLD, the return of SamSam, and more!

Sponsored By:

Links:

  • psi: pressure stall information for CPU, memory, and IO v2 — PSI aggregates and reports the overall wallclock time in which the tasks in a system (or cgroup) wait for contended hardware resources.
  • Chinese “hackers” are sending malware via snail mail — The trick is simple: a package arrives with a Chinese postmark containing a rambling message and a small CD. The CD, in turn, contains a set of Word files that include script-based malware. These scripts run when the victims access them on their computers, presumably resulting in compromised systems.
  • The death of a TLD
  • SamSam: The (almost) $6 million ransomware — Through original analysis, interviews and research, and by collaborating closely with industry partners and a specialist cryptocurrency monitoring organisation, Sophos has uncovered new details about how the secretive and sophisticated SamSam ransomware is used, who’s been targeted, how it works and how it’s evolving.
  • Open sourcing oomd, a new approach to handling OOMs — As our infrastructure has scaled, we’ve found that an increasing fraction of our machines and networks span multiple generations. One side effect of this multigenerational production environment is that a new software release or configuration change might result in a system running healthily on one machine but experiencing an out-of-memory (OOM) issue on another.
  • Tyler's recent job story
]]>
https://fireside.fm/player/v2/sHzmXDIv+RxhFM2D9 ]]> Chris Fisher Wes Payne
Episode 376: Google Don’t Front https://techsnap.systems/376 64ab2677-e4ea-4677-99ee-e849027b0532 Thu, 26 Jul 2018 15:15:00 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting We’ll explain what Domain Fronting is, how activists can use it to avoid censorship, and why large organizations are compelled to disable it. 35:08 false Google and Amazon recently shutdown Domain Fronting. Their abrupt change has created a building backlash.

We’ll explain what Domain Fronting is, how activists can use it to avoid censorship, and why large organizations are compelled to disable it.

Plus how road navigation systems can be spoofed with $223 in hardware, and another bad Bluetooth bug.

]]>
Domain Fronting, Bluetooth Bug, Diffie-Hellman key exchanges, Apple, Broadcom, Intel, Qualcomm, Duplicati, off-site backups, HTTPS, HTTPS encrypted tunnel, Cloudfront Google and Amazon recently shutdown Domain Fronting. Their abrupt change has created a building backlash.

We’ll explain what Domain Fronting is, how activists can use it to avoid censorship, and why large organizations are compelled to disable it.

Plus how road navigation systems can be spoofed with $223 in hardware, and another bad Bluetooth bug.

Sponsored By:

Links:

]]>
Google and Amazon recently shutdown Domain Fronting. Their abrupt change has created a building backlash.

We’ll explain what Domain Fronting is, how activists can use it to avoid censorship, and why large organizations are compelled to disable it.

Plus how road navigation systems can be spoofed with $223 in hardware, and another bad Bluetooth bug.

Sponsored By:

Links:

]]>
https://fireside.fm/player/v2/sHzmXDIv+mO1MtA0v ]]> Chris Fisher Wes Payne
Episode 375: Surprise Root Access https://techsnap.systems/375 a818e1e6-8b7b-452a-bdb8-8967dd8e3f0c Thu, 19 Jul 2018 20:15:00 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Google's Cloud Platform suffers an outage, and iPhones in India get owned after a very specific attack. 35:54 true Google's Cloud Platform suffers an outage, and iPhones in India get owned after a very specific attack.

Plus how a malware author built a massive 18,000 strong Botnet in one day, and Cisco finds more "undocumented" root passwords.

]]>
Google Cloud Outage, Botnet, backdoor root, MDM, iPhone, Election Systems & Software, backup Strategy, sysadmin podcast, techsnap Google's Cloud Platform suffers an outage, and iPhones in India get owned after a very specific attack.

Plus how a malware author built a massive 18,000 strong Botnet in one day, and Cisco finds more "undocumented" root passwords.

Sponsored By:

Links:

]]>
Google's Cloud Platform suffers an outage, and iPhones in India get owned after a very specific attack.

Plus how a malware author built a massive 18,000 strong Botnet in one day, and Cisco finds more "undocumented" root passwords.

Sponsored By:

Links:

]]>
https://fireside.fm/player/v2/sHzmXDIv+nTQvHs4e ]]> Chris Fisher Wes Payne
Episode 374: Quantum Resistant Encryption https://techsnap.systems/374 7a87af82-bd6a-4e38-8986-767b339b094b Fri, 13 Jul 2018 05:00:00 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Good progress is being made on post-quantum resilient computing. We’ll explain how they’re achieving it, the risks facing traditional cryptography. 47:44 false Good progress is being made on post-quantum resilient computing. We’ll explain how they’re achieving it, the risks facing traditional cryptography.

Plus how bad defaults led to the theft of military Drone docs, new attacks against LTE networks, more!

]]>
Quantum Computing, cryptography, qubits, Post-Quantum Cryptography project, Timehop, Default FTP Password, Netgear, Nighthawk R7000, MQ-9 Reaper, post-quantum resistance, LTE attack, alter attack, sysadmin podcast, techsnap Good progress is being made on post-quantum resilient computing. We’ll explain how they’re achieving it, the risks facing traditional cryptography.

Plus how bad defaults led to the theft of military Drone docs, new attacks against LTE networks, more!

Sponsored By:

Links:

]]>
Good progress is being made on post-quantum resilient computing. We’ll explain how they’re achieving it, the risks facing traditional cryptography.

Plus how bad defaults led to the theft of military Drone docs, new attacks against LTE networks, more!

Sponsored By:

Links:

]]>
https://fireside.fm/player/v2/sHzmXDIv+keTrAqn1 ]]> Chris Fisher Wes Payne
Episode 373: FreeBSD Already Does That https://techsnap.systems/373 0888564b-a3e6-446c-9713-e9f8dbad9f5a Thu, 05 Jul 2018 07:45:00 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Allan Jude and Wes sit-down for a special live edition of the TechSNAP program. 1:35:35 false Allan Jude and Wes sit-down for a special live edition of the TechSNAP program.

Joined by Jed and Jeff they have a wide ranging organic conversation.

Special Guest: Allan Jude.

]]>
Stock exchange outage, UPS Failure, Server Rack Death, solar, IT culture, sysadmin podcast, techsnap Allan Jude and Wes sit-down for a special live edition of the TechSNAP program.

Joined by Jed and Jeff they have a wide ranging organic conversation.

Special Guest: Allan Jude.

Sponsored By:

]]>
Allan Jude and Wes sit-down for a special live edition of the TechSNAP program.

Joined by Jed and Jeff they have a wide ranging organic conversation.

Special Guest: Allan Jude.

Sponsored By:

]]>
https://fireside.fm/player/v2/sHzmXDIv+JjY2_BlH ]]> Chris Fisher Wes Payne Allan Jude
Episode 372: Logs and Metrics and Traces, Oh My! https://techsnap.systems/372 202308b7-ed73-4cec-bfff-12b25ddb621d Thu, 14 Jun 2018 16:45:00 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Netflix has learned the hard way how to utilize all the logs, we cover their lessons in their journey to build a fully observable system. 36:01 false Netflix has learned the hard way how to utilize all the logs, we cover their lessons in their journey to build a fully observable system.

Plus the Lazy State FPU bug that cropped up this week, backdoored Docker images, your questions, and more!

]]>
Netflix has learned the hard way how to utilize all the logs, we cover their lessons in their journey to build a fully observable system.

Plus the Lazy State FPU bug that cropped up this week, backdoored Docker images, your questions, and more!

Sponsored By:

Links:

]]>
Netflix has learned the hard way how to utilize all the logs, we cover their lessons in their journey to build a fully observable system.

Plus the Lazy State FPU bug that cropped up this week, backdoored Docker images, your questions, and more!

Sponsored By:

Links:

]]>
https://fireside.fm/player/v2/sHzmXDIv+LmfBKcP6 ]]> Chris Fisher Wes Payne
Episode 371: They Never Learn https://techsnap.systems/371 6c8e575e-ede8-4bae-b569-b82e0be33374 Thu, 07 Jun 2018 15:15:00 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Microsoft puts a data center under the ocean, and they might be onto something. The Zip Slip vulnerability sneaks into your software, and VPNFilter turns out to be more complicated than first known. 44:23 false Microsoft puts a data center under the ocean, and they might be onto something. The Zip Slip vulnerability sneaks into your software, and VPNFilter turns out to be more complicated than first known.

Plus the mass exploit of Drupalgeddon2 continues, we break down why, a batch of questions, and more.

]]>
Microsoft puts a data center under the ocean, and they might be onto something. The Zip Slip vulnerability sneaks into your software, and VPNFilter turns out to be more complicated than first known.

Plus the mass exploit of Drupalgeddon2 continues, we break down why, a batch of questions, and more.

Sponsored By:

Links:

]]>
Microsoft puts a data center under the ocean, and they might be onto something. The Zip Slip vulnerability sneaks into your software, and VPNFilter turns out to be more complicated than first known.

Plus the mass exploit of Drupalgeddon2 continues, we break down why, a batch of questions, and more.

Sponsored By:

Links:

]]>
https://fireside.fm/player/v2/sHzmXDIv+G_nBtcoq ]]> Chris Fisher Wes Payne
Episode 370: Hidden in Plain Sight https://techsnap.systems/370 cbe34348-d2f2-41f1-8480-38bdbc5dd8ce Fri, 01 Jun 2018 08:00:00 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting We explain how the much hyped VPNFilter malware actually works, and its rather surprising sophistication. 51:29 false We explain how the much hyped VPNFilter malware actually works, and its rather surprising sophistication.

Plus a clear break down of the recent Kubernetes news, how a 40 year old tel-co protocol is being abused today, and a Git vulnerability you should know about.

]]>
We explain how the much hyped VPNFilter malware actually works, and its rather surprising sophistication.

Plus a clear break down of the recent Kubernetes news, how a 40 year old tel-co protocol is being abused today, and a Git vulnerability you should know about.

Sponsored By:

Links:

]]>
We explain how the much hyped VPNFilter malware actually works, and its rather surprising sophistication.

Plus a clear break down of the recent Kubernetes news, how a 40 year old tel-co protocol is being abused today, and a Git vulnerability you should know about.

Sponsored By:

Links:

]]>
https://fireside.fm/player/v2/sHzmXDIv+zrhoMxBr ]]> Chris Fisher Wes Payne
Episode 369: Another Pass at Bypass https://techsnap.systems/369 c9e44cac-c711-4e40-a417-2d0ecc5712e7 Wed, 23 May 2018 14:00:00 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting We’ll explain how Speculative Store Bypass works, and the new mitigation techniques that are inbound. 44:43 false We’ll explain how Speculative Store Bypass works, and the new mitigation techniques that are inbound.

Plus this week’s security news has a bit of a theme, and we share some great war stories sent into the show.

]]>
We’ll explain how Speculative Store Bypass works, and the new mitigation techniques that are inbound.

Plus this week’s security news has a bit of a theme, and we share some great war stories sent into the show.

Sponsored By:

Links:

]]>
We’ll explain how Speculative Store Bypass works, and the new mitigation techniques that are inbound.

Plus this week’s security news has a bit of a theme, and we share some great war stories sent into the show.

Sponsored By:

Links:

]]>
https://fireside.fm/player/v2/sHzmXDIv+0eCS0ACo ]]> Chris Fisher Wes Payne
Episode 368: EFail Explained https://techsnap.systems/368 810af786-1ddc-475f-82e7-65a38debf64e Tue, 15 May 2018 12:45:00 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting The EFail hype-train has hit hypersonic speed, we’ll tap the breaks and explain who disclosed it, what it is, what it’s not, our recommendations, and early reactions. 36:47 false The EFail hype-train has hit hypersonic speed, we’ll tap the breaks and explain who disclosed it, what it is, what it’s not, our recommendations, and early reactions.

Plus things to consider when deciding on-premises vs a cloud deployment, and the all business gadget from 1971 that kicked off the consumer electronics revolution.

]]>
The EFail hype-train has hit hypersonic speed, we’ll tap the breaks and explain who disclosed it, what it is, what it’s not, our recommendations, and early reactions.

Plus things to consider when deciding on-premises vs a cloud deployment, and the all business gadget from 1971 that kicked off the consumer electronics revolution.

Links:

]]>
The EFail hype-train has hit hypersonic speed, we’ll tap the breaks and explain who disclosed it, what it is, what it’s not, our recommendations, and early reactions.

Plus things to consider when deciding on-premises vs a cloud deployment, and the all business gadget from 1971 that kicked off the consumer electronics revolution.

Links:

]]>
https://fireside.fm/player/v2/sHzmXDIv+0V7ZRaLZ ]]> Chris Fisher Wes Payne
Episode 367: FreeNAS Uber Build https://techsnap.systems/367 7e453cc2-5a2c-46a3-8ff4-eaec869e0dde Tue, 08 May 2018 17:00:00 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Our FreeNAS build is complete and Allan’s back to cover the final details. Plus the new GPU attack against Android phones, and a perfect example of poor IoT security. 37:04 false Our FreeNAS build is complete and Allan’s back to cover the final details. Plus the new GPU attack against Android phones, and a perfect example of poor IoT security.

]]>
Our FreeNAS build is complete and Allan’s back to cover the final details. Plus the new GPU attack against Android phones, and a perfect example of poor IoT security.

Sponsored By:

Links:

]]>
Our FreeNAS build is complete and Allan’s back to cover the final details. Plus the new GPU attack against Android phones, and a perfect example of poor IoT security.

Sponsored By:

Links:

]]>
https://fireside.fm/player/v2/sHzmXDIv+RfIgj2zd ]]> Chris Fisher Wes Payne
Episode 366: Catching up with Allan https://techsnap.systems/366 c3a8238e-1697-4086-90d1-7b9a02d8379c Wed, 02 May 2018 15:00:00 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting We catch up with Allan Jude and he shares stories of hunting network bottlenecks, memories of old firewalls, and some classic ZFS updates. 48:32 false We catch up with Allan Jude and he shares stories of hunting network bottlenecks, memories of old firewalls, and some classic ZFS updates.

Plus the vulnerabilities found in Volkswagen cars, and the lengths a security research went to create the ultimate honeypot laptop.

Special Guest: Allan Jude.

]]>
We catch up with Allan Jude and he shares stories of hunting network bottlenecks, memories of old firewalls, and some classic ZFS updates.

Plus the vulnerabilities found in Volkswagen cars, and the lengths a security research went to create the ultimate honeypot laptop.

Special Guest: Allan Jude.

Sponsored By:

Links:

]]>
We catch up with Allan Jude and he shares stories of hunting network bottlenecks, memories of old firewalls, and some classic ZFS updates.

Plus the vulnerabilities found in Volkswagen cars, and the lengths a security research went to create the ultimate honeypot laptop.

Special Guest: Allan Jude.

Sponsored By:

Links:

]]>
https://fireside.fm/player/v2/sHzmXDIv+BipC3I8p ]]> Chris Fisher Wes Payne Allan Jude
Episode 365: The Unfixable Exploit https://techsnap.systems/365 bebfb1b6-cfe5-4c97-855e-24922aeb957c Tue, 24 Apr 2018 17:00:00 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Hardware flaws that can’t be solved, human errors at the physical layer, and spoofing cellular networks with a $5 dongle. 38:54 false Hardware flaws that can’t be solved, human errors at the physical layer, and spoofing cellular networks with a $5 dongle.

]]>
Hardware flaws that can’t be solved, human errors at the physical layer, and spoofing cellular networks with a $5 dongle.

Sponsored By:

Links:

]]>
Hardware flaws that can’t be solved, human errors at the physical layer, and spoofing cellular networks with a $5 dongle.

Sponsored By:

Links:

]]>
https://fireside.fm/player/v2/sHzmXDIv+69aAZ8pe ]]> Chris Fisher Wes Payne
Episode 364: The Case for Monitoring https://techsnap.systems/364 a667b0ef-12f5-4934-aea6-f713674f2647 Wed, 18 Apr 2018 12:00:00 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting We cover all the bases this week in our TechSNAP introduction to server monitoring. 37:43 false We cover all the bases this week in our TechSNAP introduction to server monitoring.

Why you should monitor, what you should monitor, the basics of Nagios, the biggest drawbacks of Nagios, its alternatives, and our lessons learned from the trenches.

]]>
We cover all the bases this week in our TechSNAP introduction to server monitoring.

Why you should monitor, what you should monitor, the basics of Nagios, the biggest drawbacks of Nagios, its alternatives, and our lessons learned from the trenches.

Sponsored By:

Links:

]]>
We cover all the bases this week in our TechSNAP introduction to server monitoring.

Why you should monitor, what you should monitor, the basics of Nagios, the biggest drawbacks of Nagios, its alternatives, and our lessons learned from the trenches.

Sponsored By:

Links:

]]>
https://fireside.fm/player/v2/sHzmXDIv+csXT_2GK ]]> Chris Fisher Wes Payne
Episode 363: Tips from the Top https://techsnap.systems/363 2f57aaaa-4b64-4c6f-809f-121a3710a543 Thu, 12 Apr 2018 13:00:00 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Getting started or getting ahead in IT is a moving target, so we’ve crowd sourced some of the best tips and advice to help. 35:13 false Getting started or getting ahead in IT is a moving target, so we’ve crowd sourced some of the best tips and advice to help.

Plus a tricky use of zero-width characters to catch a leaker, a breakdown of the new BranchScope attack, and a full post-mortem of the recent Travis CI outage.

]]>
Getting started or getting ahead in IT is a moving target, so we’ve crowd sourced some of the best tips and advice to help.

Plus a tricky use of zero-width characters to catch a leaker, a breakdown of the new BranchScope attack, and a full post-mortem of the recent Travis CI outage.

Sponsored By:

Links:

]]>
Getting started or getting ahead in IT is a moving target, so we’ve crowd sourced some of the best tips and advice to help.

Plus a tricky use of zero-width characters to catch a leaker, a breakdown of the new BranchScope attack, and a full post-mortem of the recent Travis CI outage.

Sponsored By:

Links:

]]>
https://fireside.fm/player/v2/sHzmXDIv+pqcuYY10 ]]> Chris Fisher Wes Payne
Episode 362: Rebuilding it Better https://techsnap.systems/362 a2457c20-9cb0-41b9-9599-ed6235873934 Thu, 05 Apr 2018 04:00:00 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting It’s a TechSNAP introduction to Terraform, a tool for building, changing, and versioning infrastructure safely and efficiently. 35:11 false It’s a TechSNAP introduction to Terraform, a tool for building, changing, and versioning infrastructure safely and efficiently.

Plus a recent spat of data leaks suggest a common theme, Microsoft’s self inflicted Total Meltdown flaw, and playing around with DNS Rebinding attacks for fun.

]]>
It’s a TechSNAP introduction to Terraform, a tool for building, changing, and versioning infrastructure safely and efficiently.

Plus a recent spat of data leaks suggest a common theme, Microsoft’s self inflicted Total Meltdown flaw, and playing around with DNS Rebinding attacks for fun.

Sponsored By:

Links:

  • The Under Armour Hack Was Even Worse Than It Had To Be — When Under Armour announced that its nutrition app MyFitnessPal had suffered a data breach impacting the information of roughly 150 million users, things actually didn't seem so bad.
  • Panerabread.com Leaks Millions of Customer Records — Panerabread.com, the Web site for the American chain of bakery-cafe fast casual restaurants by the same name, leaked millions of customer records — including names, email and physical addresses, birthdays and the last four digits of the customer’s credit card number — for at least eight months before it was yanked offline earlier today, KrebsOnSecurity has learned.
  • No, Panera Bread Doesn’t Take Security Seriously – PB — This post establishes a canonical timeline so subsequent reporting doesn’t get confused.
  • Total Meltdown — In short - the User/Supervisor permission bit was set to User in the PML4 self-referencing entry. This made the page tables available to user mode code in every process. The page tables should normally only be accessible by the kernel itself.
  • Terraform by HashiCorp — HashiCorp Terraform enables you to safely and predictably create, change, and improve infrastructure. It is an open source tool that codifies APIs into declarative configuration files that can be shared amongst team members, treated as code, edited, reviewed, and versioned.
  • Terraforming 1Password - AgileBits Blog — Most of the 2 hours and 39 minutes of downtime were related to data migration. The 1Password.com database is just under 1TB in size (not including documents and attachments), and it took almost two hours to complete the snapshot and restore operations.
  • Whonow — A malicious DNS server for executing DNS Rebinding attacks on the fly
]]>
It’s a TechSNAP introduction to Terraform, a tool for building, changing, and versioning infrastructure safely and efficiently.

Plus a recent spat of data leaks suggest a common theme, Microsoft’s self inflicted Total Meltdown flaw, and playing around with DNS Rebinding attacks for fun.

Sponsored By:

Links:

  • The Under Armour Hack Was Even Worse Than It Had To Be — When Under Armour announced that its nutrition app MyFitnessPal had suffered a data breach impacting the information of roughly 150 million users, things actually didn't seem so bad.
  • Panerabread.com Leaks Millions of Customer Records — Panerabread.com, the Web site for the American chain of bakery-cafe fast casual restaurants by the same name, leaked millions of customer records — including names, email and physical addresses, birthdays and the last four digits of the customer’s credit card number — for at least eight months before it was yanked offline earlier today, KrebsOnSecurity has learned.
  • No, Panera Bread Doesn’t Take Security Seriously – PB — This post establishes a canonical timeline so subsequent reporting doesn’t get confused.
  • Total Meltdown — In short - the User/Supervisor permission bit was set to User in the PML4 self-referencing entry. This made the page tables available to user mode code in every process. The page tables should normally only be accessible by the kernel itself.
  • Terraform by HashiCorp — HashiCorp Terraform enables you to safely and predictably create, change, and improve infrastructure. It is an open source tool that codifies APIs into declarative configuration files that can be shared amongst team members, treated as code, edited, reviewed, and versioned.
  • Terraforming 1Password - AgileBits Blog — Most of the 2 hours and 39 minutes of downtime were related to data migration. The 1Password.com database is just under 1TB in size (not including documents and attachments), and it took almost two hours to complete the snapshot and restore operations.
  • Whonow — A malicious DNS server for executing DNS Rebinding attacks on the fly
]]>
https://fireside.fm/player/v2/sHzmXDIv+Hb6u7e6m ]]> Chris Fisher Wes Payne
Episode 361: It's All in the Log https://techsnap.systems/361 60c0569a-55b4-446f-bf42-6d017d933f4f Thu, 29 Mar 2018 08:00:00 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Embarrassing flaws get exposed when the logs get reviewed, Atlanta city government gets shut down by Ransomware, and the cleverest little Android malware you’ll ever meet. 32:49 false Embarrassing flaws get exposed when the logs get reviewed, Atlanta city government gets shut down by Ransomware, and the cleverest little Android malware you’ll ever meet.

Plus we go from a hacked client to a Zero-day discovery, answer some questions, ask a few, and more!

]]>
Embarrassing flaws get exposed when the logs get reviewed, Atlanta city government gets shut down by Ransomware, and the cleverest little Android malware you’ll ever meet.

Plus we go from a hacked client to a Zero-day discovery, answer some questions, ask a few, and more!

Sponsored By:

Links:

]]>
Embarrassing flaws get exposed when the logs get reviewed, Atlanta city government gets shut down by Ransomware, and the cleverest little Android malware you’ll ever meet.

Plus we go from a hacked client to a Zero-day discovery, answer some questions, ask a few, and more!

Sponsored By:

Links:

]]>
https://fireside.fm/player/v2/sHzmXDIv+cMa88LVQ ]]> Chris Fisher Wes Payne
Episode 360: AMD Flaws Explained https://techsnap.systems/360 2bdd82c5-b92f-4a94-af10-1fdc61f7a3a9 Thu, 22 Mar 2018 12:00:00 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting We cut through the noise and explain in clear terms what’s really been discovered. The botched disclosure of flaws in AMD products has overshadowed the technical details of the vulnerabilities, and we aim to fix that.. 29:09 false We cut through the noise and explain in clear terms what’s really been discovered. The botched disclosure of flaws in AMD products has overshadowed the technical details of the vulnerabilities, and we aim to fix that..

Plus another DNS Rebinding attack is in the wild and stealing Ethereum, Microsoft opens up a new bug bounty program, Expedia gets hacked, and we perform a TechSNAP checkup.

]]>
We cut through the noise and explain in clear terms what’s really been discovered. The botched disclosure of flaws in AMD products has overshadowed the technical details of the vulnerabilities, and we aim to fix that..

Plus another DNS Rebinding attack is in the wild and stealing Ethereum, Microsoft opens up a new bug bounty program, Expedia gets hacked, and we perform a TechSNAP checkup.

Sponsored By:

Links:

]]>
We cut through the noise and explain in clear terms what’s really been discovered. The botched disclosure of flaws in AMD products has overshadowed the technical details of the vulnerabilities, and we aim to fix that..

Plus another DNS Rebinding attack is in the wild and stealing Ethereum, Microsoft opens up a new bug bounty program, Expedia gets hacked, and we perform a TechSNAP checkup.

Sponsored By:

Links:

]]>
https://fireside.fm/player/v2/sHzmXDIv+DFXMEsdG ]]> Chris Fisher Wes Payne
Episode 359: Netflix’s Dark Capacity https://techsnap.systems/359 c63e4421-989c-4e30-813c-cb967a5ab29b Thu, 15 Mar 2018 20:00:00 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Netflix has a few tricks we can learn from, and the story of clever malware that was operating undetected since 2012. 31:49 false Netflix has a few tricks we can learn from, and the story of clever malware that was operating undetected since 2012.

Plus we discuss Let's Encrypt’s Wildcard support and explain what ACME v2 is.

Then we detail the bad position Samba 4 admins are in, and the real cause of these recent 1.7Tbps DDoS attacks.

]]>
Netflix has a few tricks we can learn from, and the story of clever malware that was operating undetected since 2012.

Plus we discuss Let's Encrypt’s Wildcard support and explain what ACME v2 is.

Then we detail the bad position Samba 4 admins are in, and the real cause of these recent 1.7Tbps DDoS attacks.

Sponsored By:

Links:

]]>
Netflix has a few tricks we can learn from, and the story of clever malware that was operating undetected since 2012.

Plus we discuss Let's Encrypt’s Wildcard support and explain what ACME v2 is.

Then we detail the bad position Samba 4 admins are in, and the real cause of these recent 1.7Tbps DDoS attacks.

Sponsored By:

Links:

]]>
https://fireside.fm/player/v2/sHzmXDIv+bBw8xSjd ]]> Chris Fisher Wes Payne
Episode 358: A Future Without Servers https://techsnap.systems/358 dd10266c-5d78-43c7-bf71-1d3abb89a7a5 Thu, 01 Mar 2018 08:00:00 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting The term serverless gets thrown around a lot, but what does it really mean? What are the benefits and the drawbacks? It’s a TechSNAP introduction to Serverless Architecture. 36:28 false The term serverless gets thrown around a lot, but what does it really mean? What are the benefits and the drawbacks? It’s a TechSNAP introduction to Serverless Architecture.

Plus new research with ideas to dramatically improve private web browsing, the growing problem of tracking security vulnerabilities with CVE’s, and much more!

]]>
The term serverless gets thrown around a lot, but what does it really mean? What are the benefits and the drawbacks? It’s a TechSNAP introduction to Serverless Architecture.

Plus new research with ideas to dramatically improve private web browsing, the growing problem of tracking security vulnerabilities with CVE’s, and much more!

Sponsored By:

Links:

]]>
The term serverless gets thrown around a lot, but what does it really mean? What are the benefits and the drawbacks? It’s a TechSNAP introduction to Serverless Architecture.

Plus new research with ideas to dramatically improve private web browsing, the growing problem of tracking security vulnerabilities with CVE’s, and much more!

Sponsored By:

Links:

]]>
https://fireside.fm/player/v2/sHzmXDIv+jnzDvGAt ]]> Chris Fisher Wes Payne
Episode 357: The Return of Spectre https://techsnap.systems/357 3ad2e9bb-44f4-4889-8c42-992309c470df Thu, 22 Feb 2018 12:00:00 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting New variants, bad patches, busted microcode and devastated performance. It’s a TechSNAP Meltdown and Spectre check up. 31:53 false New variants, bad patches, busted microcode and devastated performance. It’s a TechSNAP Meltdown and Spectre check up.

Plus Tesla gets hit by Monero Cryptojacking, and a dating site that matches people based on their bad passwords…. So we gave it a go!

]]>
New variants, bad patches, busted microcode and devastated performance. It’s a TechSNAP Meltdown and Spectre check up.

Plus Tesla gets hit by Monero Cryptojacking, and a dating site that matches people based on their bad passwords…. So we gave it a go!

Sponsored By:

Links:

]]>
New variants, bad patches, busted microcode and devastated performance. It’s a TechSNAP Meltdown and Spectre check up.

Plus Tesla gets hit by Monero Cryptojacking, and a dating site that matches people based on their bad passwords…. So we gave it a go!

Sponsored By:

Links:

]]>
https://fireside.fm/player/v2/sHzmXDIv+SSsMwdKk ]]> Chris Fisher Wes Payne
Episode 356: The Concern with Containers https://techsnap.systems/356 0d9f7516-90f2-4dd5-82e4-3bb92e6de943 Thu, 15 Feb 2018 13:00:00 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting The problems containers can’t solve, nasty security flaws in Skype and Telegram, and Cisco discovers they have a bigger issue on their hands then first realized. 37:23 false The problems containers can’t solve, nasty security flaws in Skype and Telegram, and Cisco discovers they have a bigger issue on their hands then first realized.

And the latest jaw-dropping techniques to extract data from air-gapped systems.

]]>
The problems containers can’t solve, nasty security flaws in Skype and Telegram, and Cisco discovers they have a bigger issue on their hands then first realized.

And the latest jaw-dropping techniques to extract data from air-gapped systems.

Sponsored By:

Links:

]]>
The problems containers can’t solve, nasty security flaws in Skype and Telegram, and Cisco discovers they have a bigger issue on their hands then first realized.

And the latest jaw-dropping techniques to extract data from air-gapped systems.

Sponsored By:

Links:

]]>
https://fireside.fm/player/v2/sHzmXDIv+XTob9fMY ]]> Chris Fisher Wes Payne
Episode 355: Operation FreeNAS Rescue https://techsnap.systems/355 fa6f72dd-e0ec-4839-b2fb-f1651ecbeda4 Thu, 08 Feb 2018 11:00:00 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting We save our FreeNAS Mini from the edge, and perform an emergency migration to much larger hardware. 40:13 false We save our FreeNAS Mini from the edge, and perform an emergency migration to much larger hardware.

Plus 12 tips for secure authentication, the future of network security where there is no LAN, a botnet exploiting Android ADB, and your questions.

]]>
We save our FreeNAS Mini from the edge, and perform an emergency migration to much larger hardware.

Plus 12 tips for secure authentication, the future of network security where there is no LAN, a botnet exploiting Android ADB, and your questions.

Sponsored By:

Links:

  • In just 24 hours, 5,000 Android devices are conscripted into mining botnet — A fast-moving botnet that appeared over the weekend has already infected thousands of Android devices with potentially destructive malware that mines digital coins on behalf of the unknown attackers, researchers said.
  • 12 best practices for user account, authorization and password management — Account management, authorization and password management can be tricky. For many developers, account management is a dark corner that doesn't get enough attention. For product managers and customers, the resulting experience often falls short of expectations.
  • Google’s Zero Trust 'BeyondCorp' Infrastructure Shows Future Of Network Security — Google started changing its network security policies to a new model of “zero trust,” which treats its own internal network as the insecure Internet. Google released a new paper detailing how this new model works for its network security policies.
  • Google dedicates engineering team to accelerate development of WordPress ecosystem — Google's partnership with WordPress aims to jump-start the platform's support of the latest web technologies -- particularly those involving performance & mobile experience. And they're hiring WordPress experts.
  • UNIXSurplus — UNIXSurplus is a multi-level provider of new and refurbished custom built servers, storage solutions and computer equipment.
  • FreeNAS Storage Operating System — FreeNAS is an operating system that can be installed on virtually any hardware platform to share data over a network. FreeNAS is the simplest way to create a centralized and easily accessible place for your data. Use FreeNAS with ZFS to protect, store, backup, all of your data. FreeNAS is used everywhere, for the home, small business, and the enterprise.
]]>
We save our FreeNAS Mini from the edge, and perform an emergency migration to much larger hardware.

Plus 12 tips for secure authentication, the future of network security where there is no LAN, a botnet exploiting Android ADB, and your questions.

Sponsored By:

Links:

  • In just 24 hours, 5,000 Android devices are conscripted into mining botnet — A fast-moving botnet that appeared over the weekend has already infected thousands of Android devices with potentially destructive malware that mines digital coins on behalf of the unknown attackers, researchers said.
  • 12 best practices for user account, authorization and password management — Account management, authorization and password management can be tricky. For many developers, account management is a dark corner that doesn't get enough attention. For product managers and customers, the resulting experience often falls short of expectations.
  • Google’s Zero Trust 'BeyondCorp' Infrastructure Shows Future Of Network Security — Google started changing its network security policies to a new model of “zero trust,” which treats its own internal network as the insecure Internet. Google released a new paper detailing how this new model works for its network security policies.
  • Google dedicates engineering team to accelerate development of WordPress ecosystem — Google's partnership with WordPress aims to jump-start the platform's support of the latest web technologies -- particularly those involving performance & mobile experience. And they're hiring WordPress experts.
  • UNIXSurplus — UNIXSurplus is a multi-level provider of new and refurbished custom built servers, storage solutions and computer equipment.
  • FreeNAS Storage Operating System — FreeNAS is an operating system that can be installed on virtually any hardware platform to share data over a network. FreeNAS is the simplest way to create a centralized and easily accessible place for your data. Use FreeNAS with ZFS to protect, store, backup, all of your data. FreeNAS is used everywhere, for the home, small business, and the enterprise.
]]>
https://fireside.fm/player/v2/sHzmXDIv+0SueCfzw ]]> Chris Fisher Wes Payne
Episode 354: Here Come the Script Kiddies https://techsnap.systems/354 e2e1b46b-2f05-465f-821b-95680dc0cda0 Thu, 01 Feb 2018 18:00:00 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting AutoSploit has the security industry in a panic, so we give it a go. To our surprise we discover systems at the DOD, Amazon, and other places vulnerable to this automated attack. We’ll tell you all about it, and what these 400 lines of Python known as AutoSploit really do. 51:59 false AutoSploit has the security industry in a panic, so we give it a go. To our surprise we discover systems at the DOD, Amazon, and other places vulnerable to this automated attack. We’ll tell you all about it, and what these 400 lines of Python known as AutoSploit really do.

Plus injecting arbitrary waveforms into Alexa and Google Assistant commands, making WordPress bulletproof, and how to detect and prevent excessive port scan attacks.

]]>
AutoSploit has the security industry in a panic, so we give it a go. To our surprise we discover systems at the DOD, Amazon, and other places vulnerable to this automated attack. We’ll tell you all about it, and what these 400 lines of Python known as AutoSploit really do.

Plus injecting arbitrary waveforms into Alexa and Google Assistant commands, making WordPress bulletproof, and how to detect and prevent excessive port scan attacks.

Sponsored By:

Links:

]]>
AutoSploit has the security industry in a panic, so we give it a go. To our surprise we discover systems at the DOD, Amazon, and other places vulnerable to this automated attack. We’ll tell you all about it, and what these 400 lines of Python known as AutoSploit really do.

Plus injecting arbitrary waveforms into Alexa and Google Assistant commands, making WordPress bulletproof, and how to detect and prevent excessive port scan attacks.

Sponsored By:

Links:

]]>
https://fireside.fm/player/v2/sHzmXDIv+YAFs5pru ]]> Chris Fisher Wes Payne
Episode 353: Too Many Containers https://techsnap.systems/353 76cf88a2-f5d9-4dba-b314-f9f00e3767df Thu, 25 Jan 2018 16:00:00 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting We introduce you to Kubernetes, what problems it solves, why everyone is talking about it, and where it came from. Also who shouldn’t be using Kubernetes, and the problems you can run into when scaling it. 43:08 false We introduce you to Kubernetes, what problems it solves, why everyone is talking about it, and where it came from. Also who shouldn’t be using Kubernetes, and the problems you can run into when scaling it.

Plus how you can store files in others DNS resolver cache, Project Zero finds a new BitTorrent client flaw, and more.

]]>
We introduce you to Kubernetes, what problems it solves, why everyone is talking about it, and where it came from. Also who shouldn’t be using Kubernetes, and the problems you can run into when scaling it.

Plus how you can store files in others DNS resolver cache, Project Zero finds a new BitTorrent client flaw, and more.

Sponsored By:

Links:

]]>
We introduce you to Kubernetes, what problems it solves, why everyone is talking about it, and where it came from. Also who shouldn’t be using Kubernetes, and the problems you can run into when scaling it.

Plus how you can store files in others DNS resolver cache, Project Zero finds a new BitTorrent client flaw, and more.

Sponsored By:

Links:

]]>
https://fireside.fm/player/v2/sHzmXDIv+LHSYLni7 ]]> Chris Fisher Wes Payne
Episode 352: Stop Using apt-get https://techsnap.systems/352 a35e6ff5-f699-4f4a-b6dd-3f01fff2a445 Mon, 22 Jan 2018 21:00:00 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting And start using configuration management. Embrace reproducibility of systems, and streamlined management with TechSNAP’s introduction to Configuration Management. 36:40 false And start using configuration management. Embrace reproducibility of systems, and streamlined management with TechSNAP’s introduction to Configuration Management.

Plus the news of the week that could impact your systems, feedback, and more.

]]>
And start using configuration management. Embrace reproducibility of systems, and streamlined management with TechSNAP’s introduction to Configuration Management.

Plus the news of the week that could impact your systems, feedback, and more.

Sponsored By:

Links:

]]>
And start using configuration management. Embrace reproducibility of systems, and streamlined management with TechSNAP’s introduction to Configuration Management.

Plus the news of the week that could impact your systems, feedback, and more.

Sponsored By:

Links:

]]>
https://fireside.fm/player/v2/sHzmXDIv+_Jh7_kPu ]]> Chris Fisher Wes Payne
Episode 351: Performance Meltdown https://techsnap.systems/351 92c20700-9d53-4470-a263-d3e009a19100 Thu, 11 Jan 2018 16:00:00 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting The types of workloads that will see the largest performance impacts from Meltdown, tools to test yourself, and the outlook for 2018. Plus a concise breakdown of Meltdown, Spectre, and side-channel attacks like only TechSNAP can. 41:43 false The types of workloads that will see the largest performance impacts from Meltdown, tools to test yourself, and the outlook for 2018.

Plus a concise breakdown of Meltdown, Spectre, and side-channel attacks like only TechSNAP can.

Then we run through the timeline of events, and the scuttlebutt of so called coordinated disclosure. We also discuss yet another security issue in macOS High Sierra, a backdoor in popular storage appliances, your questions, and more!

]]>
The types of workloads that will see the largest performance impacts from Meltdown, tools to test yourself, and the outlook for 2018.

Plus a concise breakdown of Meltdown, Spectre, and side-channel attacks like only TechSNAP can.

Then we run through the timeline of events, and the scuttlebutt of so called coordinated disclosure. We also discuss yet another security issue in macOS High Sierra, a backdoor in popular storage appliances, your questions, and more!

Sponsored By:

Links:

]]>
The types of workloads that will see the largest performance impacts from Meltdown, tools to test yourself, and the outlook for 2018.

Plus a concise breakdown of Meltdown, Spectre, and side-channel attacks like only TechSNAP can.

Then we run through the timeline of events, and the scuttlebutt of so called coordinated disclosure. We also discuss yet another security issue in macOS High Sierra, a backdoor in popular storage appliances, your questions, and more!

Sponsored By:

Links:

]]>
https://fireside.fm/player/v2/sHzmXDIv+S3PAX8xW ]]> Chris Fisher Wes Payne
Episode 350: Trials of TLS https://techsnap.systems/350 18f0b5cf-66ed-47af-89ca-011c4a0dae68 Fri, 29 Dec 2017 08:00:00 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting A deep dive into some SMB fundamentals and practical tips to stay on top of suspicious network traffic. 50:43 false The trials and tribulations of the long journey to TLS 1.3, and the “middleware” that’s keeping us from having nice things. Plus a pack of Leaky S3 bucket stories and the data that was exposed.

Then we do a deep dive into some SMB fundamentals and practical tips to stay on top of suspicious network traffic.

]]>
The trials and tribulations of the long journey to TLS 1.3, and the “middleware” that’s keeping us from having nice things. Plus a pack of Leaky S3 bucket stories and the data that was exposed.

Then we do a deep dive into some SMB fundamentals and practical tips to stay on top of suspicious network traffic.

Sponsored By:

Links:

  • Why TLS 1.3 isn't in browsers yet — It has been over a year since Cloudflare’s TLS 1.3 launch and still, none of the major browsers have enabled TLS 1.3 by default.
  • TLS 1.3 middleboxes test — This page performs some tests to check for middlebox interference with TLS 1.3. For that it requires Adobe Flash and TCP port 843 to be open. If this is not the case, all tests will fail with N/A.
  • Drone maker DJI left its private SSL, firmware keys open to world+dog on GitHub FOR YEARS — AWS account credentials and firmware AES encryption keys were also exposed on GitHub,
  • Data on 123 million US households exposed — Leaky bucket might be a better description because when opened the database revealed the personal financial data of 123m American households – in effect everyone with an address in the US around the time of the file’s creation in 2013.
  • Massive US military social media spying archive left wide open in AWS S3 buckets — Three misconfigured AWS S3 buckets have been discovered wide open on the public internet containing "dozens of terabytes" of social media posts and similar pages – all scraped from around the world by the US military to identify and profile persons of interest.
  • Security Monkey — Security Monkey monitors your AWS and GCP accounts for policy changes and alerts on insecure configurations. Support is available for OpenStack public and private clouds. It provides a single UI to browse and search through all of your accounts, regions, and cloud services. The monkey remembers previous states and can show you exactly what changed, and when.
  • An Introduction to SMB for Network Security Analysts — At its most basic, SMB is a protocol to allow devices to perform a number of functions on each other over a (usually local) network.
  • StorageCrypter Ransomware: Security Threat or Clickbait? — Hats off to the most buzzword-loaded headline of the year: “StorageCrypt Ransomware Infecting NAS Devices Using SambaCry”.
  • DHCPDECLINE Follow Up — I think I have a hypothesis. When dhclient is offered an IP, it attempts to look it up in dhcpd.leases (under /var), and if /var has errors, the lookup fails and says "not found" (which is what the DHCPDECLINE line says in the log).
  • Please keep some BSD — Please don't get too Linux single-minded. Some FreeBSD plugs here and there are welcome.
  • Repairing a 1960s mainframe: Fixing the IBM 1401's core memory and power supply — Core memory was a popular form of storage in this era as it was relatively fast and inexpensive. Each bit is stored in a tiny magnetized ferrite ring called a core.
]]>
The trials and tribulations of the long journey to TLS 1.3, and the “middleware” that’s keeping us from having nice things. Plus a pack of Leaky S3 bucket stories and the data that was exposed.

Then we do a deep dive into some SMB fundamentals and practical tips to stay on top of suspicious network traffic.

Sponsored By:

Links:

  • Why TLS 1.3 isn't in browsers yet — It has been over a year since Cloudflare’s TLS 1.3 launch and still, none of the major browsers have enabled TLS 1.3 by default.
  • TLS 1.3 middleboxes test — This page performs some tests to check for middlebox interference with TLS 1.3. For that it requires Adobe Flash and TCP port 843 to be open. If this is not the case, all tests will fail with N/A.
  • Drone maker DJI left its private SSL, firmware keys open to world+dog on GitHub FOR YEARS — AWS account credentials and firmware AES encryption keys were also exposed on GitHub,
  • Data on 123 million US households exposed — Leaky bucket might be a better description because when opened the database revealed the personal financial data of 123m American households – in effect everyone with an address in the US around the time of the file’s creation in 2013.
  • Massive US military social media spying archive left wide open in AWS S3 buckets — Three misconfigured AWS S3 buckets have been discovered wide open on the public internet containing "dozens of terabytes" of social media posts and similar pages – all scraped from around the world by the US military to identify and profile persons of interest.
  • Security Monkey — Security Monkey monitors your AWS and GCP accounts for policy changes and alerts on insecure configurations. Support is available for OpenStack public and private clouds. It provides a single UI to browse and search through all of your accounts, regions, and cloud services. The monkey remembers previous states and can show you exactly what changed, and when.
  • An Introduction to SMB for Network Security Analysts — At its most basic, SMB is a protocol to allow devices to perform a number of functions on each other over a (usually local) network.
  • StorageCrypter Ransomware: Security Threat or Clickbait? — Hats off to the most buzzword-loaded headline of the year: “StorageCrypt Ransomware Infecting NAS Devices Using SambaCry”.
  • DHCPDECLINE Follow Up — I think I have a hypothesis. When dhclient is offered an IP, it attempts to look it up in dhcpd.leases (under /var), and if /var has errors, the lookup fails and says "not found" (which is what the DHCPDECLINE line says in the log).
  • Please keep some BSD — Please don't get too Linux single-minded. Some FreeBSD plugs here and there are welcome.
  • Repairing a 1960s mainframe: Fixing the IBM 1401's core memory and power supply — Core memory was a popular form of storage in this era as it was relatively fast and inexpensive. Each bit is stored in a tiny magnetized ferrite ring called a core.
]]>
https://fireside.fm/player/v2/sHzmXDIv+RPzENzmM ]]> Chris Fisher Wes Payne
Episode 349: All Natural Namespaces https://techsnap.systems/349 1f0cbb01-a231-4cf6-9f5d-f3ded5714065 Thu, 21 Dec 2017 19:00:00 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Network Namespaces have been around for a while, but there may be be some very practical ways to use them that you’ve never considered. Wes does a deep dive into a very flexible tool. 50:00 false Network Namespaces have been around for a while, but there may be be some very practical ways to use them that you’ve never considered. Wes does a deep dive into a very flexible tool.

Plus what might be the world’s most important killswitch, the real dollar values for stolen credentials and the 19 year old attack that’s back.

]]>
Network Namespaces have been around for a while, but there may be be some very practical ways to use them that you’ve never considered. Wes does a deep dive into a very flexible tool.

Plus what might be the world’s most important killswitch, the real dollar values for stolen credentials and the 19 year old attack that’s back.

Sponsored By:

Links:

]]>
Network Namespaces have been around for a while, but there may be be some very practical ways to use them that you’ve never considered. Wes does a deep dive into a very flexible tool.

Plus what might be the world’s most important killswitch, the real dollar values for stolen credentials and the 19 year old attack that’s back.

Sponsored By:

Links:

]]>
https://fireside.fm/player/v2/sHzmXDIv+95DVl9DJ ]]> Chris Fisher Wes Payne
Episode 348: Server Neglect https://techsnap.systems/348 74701ab6-ae93-42d3-b9ed-e8ec152108fd Thu, 14 Dec 2017 13:00:00 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Authors of one of the most infamous botnets of all time get busted, researchers discover keyloggers built into HP Laptops, the major HomeKit flaw no one is talking about, and the new version of FreeNAS packs a lot of features for a point release. 49:13 false Authors of one of the most infamous botnets of all time get busted, researchers discover keyloggers built into HP Laptops, the major HomeKit flaw no one is talking about, and the new version of FreeNAS packs a lot of features for a point release.

Plus an update on the show and what to expect, and we attempt something TechSNAP could never do as a video production, a live double FreeNAS upgrade!

]]>
Authors of one of the most infamous botnets of all time get busted, researchers discover keyloggers built into HP Laptops, the major HomeKit flaw no one is talking about, and the new version of FreeNAS packs a lot of features for a point release.

Plus an update on the show and what to expect, and we attempt something TechSNAP could never do as a video production, a live double FreeNAS upgrade!

Sponsored By:

Links:

  • Our New Contact Page
  • Mirai IoT Botnet Co-Authors Plead Guilty — Krebs on Security — The U.S. Justice Department on Tuesday unsealed the guilty pleas of two men first identified in January 2017 by KrebsOnSecurity as the likely co-authors of Mirai, a malware strain that remotely enslaves so-called “Internet of Things” devices such as security cameras, routers, and digital video recorders for use in large scale attacks designed to knock Web sites and entire networks offline (including multiple major attacks against this site).
  • Pre-Installed Keylogger Found On Over 460 HP Laptop Models — The Keylogger was found embedded in the SynTP.sys file, a part of Synaptics touchpad driver that ships with HP notebook computers, leaving more than 460 HP Notebook models vulnerable to hackers.
  • HP keylogger - ZwClose Blog Post — TL;DR: HP had a keylogger in the keyboard driver. The keylogger saved scan codes to a WPP trace. The logging was disabled by default but could be enabled by setting a registry value (UAC required)
  • Apple Releases iOS 11.2.1 Update With HomeKit Fix — According to Apple's release notes, the update re-enables remote access for shared users of the Home app. Apple broke remote access for shared users when implementing a fix for a major HomeKit vulnerability last week.
  • FreeNAS 11.1 Released — The FreeNAS Development Team is excited and proud to present FreeNAS 11.1! FreeNAS 11.1 adds cloud integration, OpenZFS performance improvements, including the ability to prioritize resilvering operations, and preliminary Docker support to the world’s most popular software-defined storage operating system. This release includes an updated preview of the beta version of the new administrator graphical user interface, including the ability to select display themes. This post provides a brief overview of the new features.
  • Process Doppelgänging Attack — Dubbed ‘Process Doppelgänging‘ by Tal Liberman and Eugene Kogan of EnSilo, the attack was demonstrated during Black Hat Europe 2017 security conference in London earlier today. Doppelgänging, a fileless code injection technique, works in such a manner that an attacker can manipulate the way Windows handles its file transaction process and pass malicious files even if the code is known to be malicious.
  • Process Doppelgänging - Black Hat Europe 2017 — By using NTFS transactions, we make changes to an executable file that will never actually be committed to disk. We will then use undocumented implementation details of the process loading mechanism to load our modified executable, but not before rolling back the changes we made to the executable. The result of this procedure is creating a process from the modified executable, while deployed security mechanisms in the dark.
]]>
Authors of one of the most infamous botnets of all time get busted, researchers discover keyloggers built into HP Laptops, the major HomeKit flaw no one is talking about, and the new version of FreeNAS packs a lot of features for a point release.

Plus an update on the show and what to expect, and we attempt something TechSNAP could never do as a video production, a live double FreeNAS upgrade!

Sponsored By:

Links:

  • Our New Contact Page
  • Mirai IoT Botnet Co-Authors Plead Guilty — Krebs on Security — The U.S. Justice Department on Tuesday unsealed the guilty pleas of two men first identified in January 2017 by KrebsOnSecurity as the likely co-authors of Mirai, a malware strain that remotely enslaves so-called “Internet of Things” devices such as security cameras, routers, and digital video recorders for use in large scale attacks designed to knock Web sites and entire networks offline (including multiple major attacks against this site).
  • Pre-Installed Keylogger Found On Over 460 HP Laptop Models — The Keylogger was found embedded in the SynTP.sys file, a part of Synaptics touchpad driver that ships with HP notebook computers, leaving more than 460 HP Notebook models vulnerable to hackers.
  • HP keylogger - ZwClose Blog Post — TL;DR: HP had a keylogger in the keyboard driver. The keylogger saved scan codes to a WPP trace. The logging was disabled by default but could be enabled by setting a registry value (UAC required)
  • Apple Releases iOS 11.2.1 Update With HomeKit Fix — According to Apple's release notes, the update re-enables remote access for shared users of the Home app. Apple broke remote access for shared users when implementing a fix for a major HomeKit vulnerability last week.
  • FreeNAS 11.1 Released — The FreeNAS Development Team is excited and proud to present FreeNAS 11.1! FreeNAS 11.1 adds cloud integration, OpenZFS performance improvements, including the ability to prioritize resilvering operations, and preliminary Docker support to the world’s most popular software-defined storage operating system. This release includes an updated preview of the beta version of the new administrator graphical user interface, including the ability to select display themes. This post provides a brief overview of the new features.
  • Process Doppelgänging Attack — Dubbed ‘Process Doppelgänging‘ by Tal Liberman and Eugene Kogan of EnSilo, the attack was demonstrated during Black Hat Europe 2017 security conference in London earlier today. Doppelgänging, a fileless code injection technique, works in such a manner that an attacker can manipulate the way Windows handles its file transaction process and pass malicious files even if the code is known to be malicious.
  • Process Doppelgänging - Black Hat Europe 2017 — By using NTFS transactions, we make changes to an executable file that will never actually be committed to disk. We will then use undocumented implementation details of the process loading mechanism to load our modified executable, but not before rolling back the changes we made to the executable. The result of this procedure is creating a process from the modified executable, while deployed security mechanisms in the dark.
]]>
https://fireside.fm/player/v2/sHzmXDIv+SzyBkksj ]]> Chris Fisher Wes Payne
Episode 347: A Farewell to Dan | TechSNAP 347 https://techsnap.systems/347 395B92E8-6FD8-4587-B725-31399554C561 Thu, 30 Nov 2017 02:00:00 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting We say farewell to Dan, but don't despair, we've still got a ton of great topics to cover as we say goodbye. We compare the handling of recent data breaches at imgur & DJI, share some in-depth guides on beefing up your security posture & much more! 1:39:59 false We say farewell to Dan, but don't despair, we've still got a ton of great topics to cover as we say goodbye. We compare the handling of recent data breaches at imgur & DJI, share some in-depth guides on beefing up your security posture & see Dan off with some of your finest feedback and the world's tastiest roundup.

]]>
We say farewell to Dan, but don't despair, we've still got a ton of great topics to cover as we say goodbye. We compare the handling of recent data breaches at imgur & DJI, share some in-depth guides on beefing up your security posture & see Dan off with some of your finest feedback and the world's tastiest roundup.

]]>
We say farewell to Dan, but don't despair, we've still got a ton of great topics to cover as we say goodbye. We compare the handling of recent data breaches at imgur & DJI, share some in-depth guides on beefing up your security posture & see Dan off with some of your finest feedback and the world's tastiest roundup.

]]>
https://fireside.fm/player/v2/sHzmXDIv+dAFeB7it ]]>
Episode 346: Neutral Nets | TechSNAP 346 https://techsnap.systems/346 DD777D2B-E077-465D-8FA3-01EF6CEF7B37 Mon, 20 Nov 2017 17:00:00 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting We get depressed over new stats confirming our worst fears about the huge number of outdated & unpatched android systems. Github wants to help you stay secure with their new Security Alerts feature. We discuss what it needs to be relevant & more! 1:17:15 false We get depressed over some new stats confirming our worst fears about the huge number of outdated and unpatched android systems. But, in some good news, Github wants to help you, and your open source projects, stay secure with their new Security Alerts feature. We discuss the details and what it needs to be relevant.

Plus some handy tips for getting out of a sticky situation in git, a net neutrality PSA, and some big news from Dan.

]]>
We get depressed over some new stats confirming our worst fears about the huge number of outdated and unpatched android systems. But, in some good news, Github wants to help you, and your open source projects, stay secure with their new Security Alerts feature. We discuss the details and what it needs to be relevant.

Plus some handy tips for getting out of a sticky situation in git, a net neutrality PSA, and some big news from Dan.

]]>
We get depressed over some new stats confirming our worst fears about the huge number of outdated and unpatched android systems. But, in some good news, Github wants to help you, and your open source projects, stay secure with their new Security Alerts feature. We discuss the details and what it needs to be relevant.

Plus some handy tips for getting out of a sticky situation in git, a net neutrality PSA, and some big news from Dan.

]]>
https://fireside.fm/player/v2/sHzmXDIv+IkwLpR8I ]]>
Episode 345: Namespaces GOTO Jail | TechSNAP 345 https://techsnap.systems/345 AC309FE0-44EE-46C2-80DF-98299422D5D7 Sat, 18 Nov 2017 01:15:00 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Jails, zones & linux containers. Dan shares his years of experience using FreeBSD jails. Wes breaks down cgroups, namespaces & explains how they come together to create a container. Plus we discuss similarities, differences, workflows & more! 1:52:35 false We can't contain our excitement as we dive deep into the world of jails, zones & so-called linux containers. Dan shares his years of experience using the time-tested original bad boy of containers, FreeBSD jails. Wes breaks down cgroups, namespaces & explains how they come together to create a container. Plus we discuss similarities, differences, workflows & more!

And of course your fantastic feedback, a record setting round-up & so much more!

]]>
We can't contain our excitement as we dive deep into the world of jails, zones & so-called linux containers. Dan shares his years of experience using the time-tested original bad boy of containers, FreeBSD jails. Wes breaks down cgroups, namespaces & explains how they come together to create a container. Plus we discuss similarities, differences, workflows & more!

And of course your fantastic feedback, a record setting round-up & so much more!

]]>
We can't contain our excitement as we dive deep into the world of jails, zones & so-called linux containers. Dan shares his years of experience using the time-tested original bad boy of containers, FreeBSD jails. Wes breaks down cgroups, namespaces & explains how they come together to create a container. Plus we discuss similarities, differences, workflows & more!

And of course your fantastic feedback, a record setting round-up & so much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+4PC--YxC ]]>
Episode 344: SSL Strippers | TechSNAP 344 https://techsnap.systems/344 F50A9D00-00DE-4897-807F-3DAE1B2FD36E Wed, 08 Nov 2017 00:00:00 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting We’ve got the disturbing tale of some negligent websites & their fraudulent fonts. Then, some top tips to evaluate the security of your banking institutions & best practices for verbal passwords. Plus, a discussion of opsec, obfuscation, security & you! 1:18:48 false You may think that’s a secure password field, but don’t be fooled! We’ve got the disturbing tale of some negligent websites & their fraudulent fonts. Then, some top tips to evaluate the security of your banking institutions & best practices for verbal passwords. Plus, a controversial discussion of opsec, obfuscation, security & you!

]]>
You may think that’s a secure password field, but don’t be fooled! We’ve got the disturbing tale of some negligent websites & their fraudulent fonts. Then, some top tips to evaluate the security of your banking institutions & best practices for verbal passwords. Plus, a controversial discussion of opsec, obfuscation, security & you!

]]>
You may think that’s a secure password field, but don’t be fooled! We’ve got the disturbing tale of some negligent websites & their fraudulent fonts. Then, some top tips to evaluate the security of your banking institutions & best practices for verbal passwords. Plus, a controversial discussion of opsec, obfuscation, security & you!

]]>
https://fireside.fm/player/v2/sHzmXDIv+6kxLm3zq ]]>
Episode 343: Low Security Pillow Storage | TechSNAP 343 https://techsnap.systems/343 D2A2DEF9-1574-4C92-B53F-329E3E591383 Tue, 31 Oct 2017 23:00:00 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting We've got some top tips to turn you from ssh-novice to port-forwarding master. Plus the latest on the confusing story of Kaspersky, the NSA & a bone-headed contractor. Then, our backup sense is tingling, with the story of $30,000 lost to a forgotten pin. 1:27:34 false We've got some top tips to turn you from ssh-novice to port-forwarding master. Plus the latest on the confusing story of Kaspersky, the NSA & a bone-headed contractor. Then, our backup sense is tingling, with the story of $30,000 lost to a forgotten pin.

And of course your fantastic feedback, a record setting round-up & so much more on this week's episode of TechSNAP!

]]>
We've got some top tips to turn you from ssh-novice to port-forwarding master. Plus the latest on the confusing story of Kaspersky, the NSA & a bone-headed contractor. Then, our backup sense is tingling, with the story of $30,000 lost to a forgotten pin.

And of course your fantastic feedback, a record setting round-up & so much more on this week's episode of TechSNAP!

]]>
We've got some top tips to turn you from ssh-novice to port-forwarding master. Plus the latest on the confusing story of Kaspersky, the NSA & a bone-headed contractor. Then, our backup sense is tingling, with the story of $30,000 lost to a forgotten pin.

And of course your fantastic feedback, a record setting round-up & so much more on this week's episode of TechSNAP!

]]>
https://fireside.fm/player/v2/sHzmXDIv+f0HNeRiP ]]>
Episode 342: Cloudy with a chance of ABI | TechSNAP 342 https://techsnap.systems/342 312D59E4-300D-45FF-B9FD-34D086C77D49 Tue, 24 Oct 2017 22:00:00 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting We air Microsoft's dirty laundry as news leaks about their less than stellar handling of a security database breach, plus a fascinating story of deceit, white lies, and tacos, so-called-smart cards might not be so smart & more! 1:41:54 false We air Microsoft's dirty laundry as news leaks about their less than stellar handling of a security database breach, plus a fascinating story of deceit, white lies, and tacos; all par for the course in the world of social engineering, and we find out that so-called-smart cards might not be so smart, after it is revealed that millions are vulnerable to a crippling cryptographic attack & more!

]]>
We air Microsoft's dirty laundry as news leaks about their less than stellar handling of a security database breach, plus a fascinating story of deceit, white lies, and tacos; all par for the course in the world of social engineering, and we find out that so-called-smart cards might not be so smart, after it is revealed that millions are vulnerable to a crippling cryptographic attack & more!

]]>
We air Microsoft's dirty laundry as news leaks about their less than stellar handling of a security database breach, plus a fascinating story of deceit, white lies, and tacos; all par for the course in the world of social engineering, and we find out that so-called-smart cards might not be so smart, after it is revealed that millions are vulnerable to a crippling cryptographic attack & more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+-73y3rsX ]]>
Episode 341: HAMR Time | TechSNAP 341 https://techsnap.systems/341 375F22EA-9EE7-4471-B477-C51B01EB5599 Tue, 17 Oct 2017 21:00:00 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting The KRACK hack takes the world by storm; Plus, third party access to your personal information through some US mobile carriers. Then the ongoing debate over HAMR, MAMR & take a mini deep dive into the world of elliptic curve cryptography. 1:08:35 false We've got bad news for Wifi-lovers as the KRACK hack takes the world by storm; We have the details & some places to watch to make sure you stay patched. Plus, some distressing revelations about third party access to your personal information through some US mobile carriers. Then we cover the ongoing debate over HAMR, MAMR, and the future of hard drive technology & take a mini deep dive into the world of elliptic curve cryptography.

]]>
We've got bad news for Wifi-lovers as the KRACK hack takes the world by storm; We have the details & some places to watch to make sure you stay patched. Plus, some distressing revelations about third party access to your personal information through some US mobile carriers. Then we cover the ongoing debate over HAMR, MAMR, and the future of hard drive technology & take a mini deep dive into the world of elliptic curve cryptography.

]]>
We've got bad news for Wifi-lovers as the KRACK hack takes the world by storm; We have the details & some places to watch to make sure you stay patched. Plus, some distressing revelations about third party access to your personal information through some US mobile carriers. Then we cover the ongoing debate over HAMR, MAMR, and the future of hard drive technology & take a mini deep dive into the world of elliptic curve cryptography.

]]>
https://fireside.fm/player/v2/sHzmXDIv+CH-l294B ]]>
Episode 340: Spy Tapes | TechSNAP 340 https://techsnap.systems/340 5220D803-BDE6-4134-9EC1-34B037810814 Thu, 12 Oct 2017 19:00:00 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting We try spycraft with a set of espionage themed stories covering everything from the latest troubles at Kaspersky to the implications of responsible disclosure at the NSA, a fascinating discussion of the ethics of running a data breach search service. 1:49:35 false We try our hand at spycraft with a set of espionage themed stories covering everything from the latest troubles at Kaspersky to the strategic implications of responsible disclosure at the NSA. Plus, a few more reasons to be careful with what you post on social media & a fascinating discussion of the ethics of running a data breach search service.

]]>
We try our hand at spycraft with a set of espionage themed stories covering everything from the latest troubles at Kaspersky to the strategic implications of responsible disclosure at the NSA. Plus, a few more reasons to be careful with what you post on social media & a fascinating discussion of the ethics of running a data breach search service.

]]>
We try our hand at spycraft with a set of espionage themed stories covering everything from the latest troubles at Kaspersky to the strategic implications of responsible disclosure at the NSA. Plus, a few more reasons to be careful with what you post on social media & a fascinating discussion of the ethics of running a data breach search service.

]]>
https://fireside.fm/player/v2/sHzmXDIv+AgE4FpeC ]]>
Episode 339: Laying Internet Pipe | TechSNAP 339 https://techsnap.systems/339 23F5A263-67E1-4372-85BF-15875915C96E Thu, 05 Oct 2017 15:45:58 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting We cover the problematic implications of SESTA, plus some PR troubles for CBS's Showtime after cryptocoin mining software was found embedded in their webpage & why tape-powered backups are still important for many large organizations. 1:14:37 false We cover the problematic implications of SESTA, the latest internet regulations proposed in the US, plus some PR troubles for CBS's Showtime after cryptocoin mining software was found embedded in their webpage & Dan gets excited as we discuss why tape-powered backups are still important for many large organizations.

And of course your feedback, a fantastic round-up & so much more on this week's episode of TechSNAP!

]]>
We cover the problematic implications of SESTA, the latest internet regulations proposed in the US, plus some PR troubles for CBS's Showtime after cryptocoin mining software was found embedded in their webpage & Dan gets excited as we discuss why tape-powered backups are still important for many large organizations.

And of course your feedback, a fantastic round-up & so much more on this week's episode of TechSNAP!

]]>
We cover the problematic implications of SESTA, the latest internet regulations proposed in the US, plus some PR troubles for CBS's Showtime after cryptocoin mining software was found embedded in their webpage & Dan gets excited as we discuss why tape-powered backups are still important for many large organizations.

And of course your feedback, a fantastic round-up & so much more on this week's episode of TechSNAP!

]]>
https://fireside.fm/player/v2/sHzmXDIv+OutAMNmI ]]>
Episode 338: Patch Your S3it | TechSNAP 338 https://techsnap.systems/338 9BD33842-C8E6-4C09-8DAA-A94AFDC619ED Wed, 27 Sep 2017 00:44:19 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Distrustful US allies further delay the NSA’s new crypto, Viacom’s leaky buckets almost expose its entire IT infrastructure, plus a few more Equifax mishaps & a government spyware tool that might just be masquerading as your favorite app. 1:07:42 false Distrustful US allies further delay the NSA’s new crypto, Viacom’s leaky buckets almost expose its entire IT infrastructure, plus a few more Equifax mishaps & a government spyware tool that might just be masquerading as your favorite app.

And of course your feedback, a fantastic round-up & so much more on this week's episode of techsnap!

]]>
Distrustful US allies further delay the NSA’s new crypto, Viacom’s leaky buckets almost expose its entire IT infrastructure, plus a few more Equifax mishaps & a government spyware tool that might just be masquerading as your favorite app.

And of course your feedback, a fantastic round-up & so much more on this week's episode of techsnap!

]]>
Distrustful US allies further delay the NSA’s new crypto, Viacom’s leaky buckets almost expose its entire IT infrastructure, plus a few more Equifax mishaps & a government spyware tool that might just be masquerading as your favorite app.

And of course your feedback, a fantastic round-up & so much more on this week's episode of techsnap!

]]>
https://fireside.fm/player/v2/sHzmXDIv+RqtJqQt6 ]]>
Episode 337: FCC’s Free Offsite Storage | TechSNAP 337 https://techsnap.systems/337 2DFF0948-13E1-464B-948B-FD81B0356EF5 Tue, 19 Sep 2017 20:42:41 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting That Equifax hack? So last week! This weeks vulnerability is BlueBorne, a new attack on just about every bluetooth capable device. Plus some favorite overlooked shell commands, a breakdown of the ACLUs lawsuit to protect your rights at the border & more! 1:23:30 false That Equifax hack? So last week! This weeks vulnerability is BlueBorne, a new attack on just about every bluetooth capable device. We've got the details, and what you need to know to get patched. Plus some of our favorite overlooked shell commands & a breakdown of the ACLUs recent lawsuit to protect your rights at the border.

]]>
That Equifax hack? So last week! This weeks vulnerability is BlueBorne, a new attack on just about every bluetooth capable device. We've got the details, and what you need to know to get patched. Plus some of our favorite overlooked shell commands & a breakdown of the ACLUs recent lawsuit to protect your rights at the border.

]]>
That Equifax hack? So last week! This weeks vulnerability is BlueBorne, a new attack on just about every bluetooth capable device. We've got the details, and what you need to know to get patched. Plus some of our favorite overlooked shell commands & a breakdown of the ACLUs recent lawsuit to protect your rights at the border.

]]>
https://fireside.fm/player/v2/sHzmXDIv+_FAkNSYc ]]>
Episode 336: Equihax | TechSNAP 336 https://techsnap.systems/336 490C5352-E6BF-470C-8E48-692D20E47D04 Tue, 12 Sep 2017 23:56:34 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Equifax got hacked, some top tips for staying safe & a debate over just who's to blame for vulnerable open source software. Then Google's breaking up with Symantec & we take a little time for Sysadmin 101, this time, ticketing systems. 1:28:46 false Equifax got hacked, some top tips for staying safe & a debate over just who's to blame for vulnerable open source software. Then Google's breaking up with Symantec & we take a little time for Sysadmin 101, this time, ticketing systems.

]]>
Equifax got hacked, some top tips for staying safe & a debate over just who's to blame for vulnerable open source software. Then Google's breaking up with Symantec & we take a little time for Sysadmin 101, this time, ticketing systems.

]]>
Equifax got hacked, some top tips for staying safe & a debate over just who's to blame for vulnerable open source software. Then Google's breaking up with Symantec & we take a little time for Sysadmin 101, this time, ticketing systems.

]]>
https://fireside.fm/player/v2/sHzmXDIv+ayl8Ux0h ]]>
Episode 335: Extended Usefulness | TechSNAP 335 https://techsnap.systems/335 6FB762CB-81A4-44D6-9CBF-4F8669355B06 Tue, 05 Sep 2017 22:23:35 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting We're extending your filesystems usefulness with extended attributes! We learn what they are & how they might be useful. Plus, we take a look behind the scenes of a major spambot operation & check in with Bruce Schneier on the state of internet privacy. 1:35:58 false We're extending your filesystems usefulness with extended attributes! We learn what they are & how they might be useful. Plus, we take a look behind the scenes of a major spambot operation & check in with Bruce Schneier on the state of internet privacy.

]]>
We're extending your filesystems usefulness with extended attributes! We learn what they are & how they might be useful. Plus, we take a look behind the scenes of a major spambot operation & check in with Bruce Schneier on the state of internet privacy.

]]>
We're extending your filesystems usefulness with extended attributes! We learn what they are & how they might be useful. Plus, we take a look behind the scenes of a major spambot operation & check in with Bruce Schneier on the state of internet privacy.

]]>
https://fireside.fm/player/v2/sHzmXDIv+krvZh73J ]]>
Episode 334: HPKP: Hard to Say, Hard to Use | TechSNAP 334 https://techsnap.systems/334 52C642F6-C12B-40AA-A740-12F311979B2C Tue, 29 Aug 2017 23:00:07 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting We discuss, and struggle to pronounce, the difficulties in deploying HTTP public key pinning & some possible alternatives you should consider. Then we get excited for (n+1)sec & explore the nuances of setting up home VPN gateway! 1:24:10 false We discuss, and struggle to pronounce, the difficulties in deploying HTTP public key pinning & some possible alternatives you should consider. Then we get excited for (n+1)sec, a new protocol for distributed multiparty chat encryption & explore the nuances of setting up home VPN gateway!

]]>
We discuss, and struggle to pronounce, the difficulties in deploying HTTP public key pinning & some possible alternatives you should consider. Then we get excited for (n+1)sec, a new protocol for distributed multiparty chat encryption & explore the nuances of setting up home VPN gateway!

]]>
We discuss, and struggle to pronounce, the difficulties in deploying HTTP public key pinning & some possible alternatives you should consider. Then we get excited for (n+1)sec, a new protocol for distributed multiparty chat encryption & explore the nuances of setting up home VPN gateway!

]]>
https://fireside.fm/player/v2/sHzmXDIv+qsrjGceB ]]>
Episode 333: Rsync On Ice | TechSNAP 333 https://techsnap.systems/333 7A5F1852-0EA4-435E-9ECD-9077D85733CC Fri, 25 Aug 2017 08:31:57 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting We take a trip to the ends of the earth and hear stories of tech support in Antarctica, cover a surprisingly reasonable new suggested standard for responsible disclosure, discuss Kreb's adventures in the world of deep-insert credit card skimmers & more! 1:34:36 false We take a trip to the ends of the earth and hear some stories of tech support in Antarctica, cover a surprisingly reasonable new suggested standard for responsible disclosure & discuss Kreb's latest adventures in the world of deep-insert credit card skimmers.

And of course your feedback, a fantastic round-up & so much more!

]]>
We take a trip to the ends of the earth and hear some stories of tech support in Antarctica, cover a surprisingly reasonable new suggested standard for responsible disclosure & discuss Kreb's latest adventures in the world of deep-insert credit card skimmers.

And of course your feedback, a fantastic round-up & so much more!

]]>
We take a trip to the ends of the earth and hear some stories of tech support in Antarctica, cover a surprisingly reasonable new suggested standard for responsible disclosure & discuss Kreb's latest adventures in the world of deep-insert credit card skimmers.

And of course your feedback, a fantastic round-up & so much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+bm7I0cxx ]]>
Episode 332: Leaky Pumps | TechSNAP 332 https://techsnap.systems/332 304638F6-1A30-49FC-8F5B-749C9499EED8 Wed, 16 Aug 2017 00:37:56 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting With some new card skimmer tech that’s more reason to watch your wallet at the pump, a few tips for postgres migrations & Dan dives deep into his quest for the ultimate boot and nuke experience. Plus your feedback, a fantastic round-up & so much more! 1:28:19 false With some clever new card skimmer tech we’ve got one more reason to watch your wallet at the gas pump, plus a few handy recommendations for postgres migrations & Dan dives deep into his quest for the ultimate boot and nuke experience.

Plus your feedback, a fantastic round-up & so much more!

]]>
With some clever new card skimmer tech we’ve got one more reason to watch your wallet at the gas pump, plus a few handy recommendations for postgres migrations & Dan dives deep into his quest for the ultimate boot and nuke experience.

Plus your feedback, a fantastic round-up & so much more!

]]>
With some clever new card skimmer tech we’ve got one more reason to watch your wallet at the gas pump, plus a few handy recommendations for postgres migrations & Dan dives deep into his quest for the ultimate boot and nuke experience.

Plus your feedback, a fantastic round-up & so much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+m7nGKEjb ]]>
Episode 331: BTRFS is Toast | TechSNAP 331 https://techsnap.systems/331 8E68E5EF-2A81-4F68-8CC1-54958EA71733 Tue, 08 Aug 2017 23:43:58 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting We discuss just how hard, or not, responsible disclosure really is, share some sad news about the status of BTRFS on RHEL, a few more reasons to use ZFS. Then, we find out if our passwords have been cracked, reveal Dan’s password hashes live & more! 1:24:56 false We discuss just how hard, or not, responsible disclosure really is, share some sad news about the status of BTRFS on RHEL, a few more reasons to use ZFS.

Then, we find out if our passwords have been cracked, reveal Dan’s password hashes live on air & more!

]]>
We discuss just how hard, or not, responsible disclosure really is, share some sad news about the status of BTRFS on RHEL, a few more reasons to use ZFS.

Then, we find out if our passwords have been cracked, reveal Dan’s password hashes live on air & more!

]]>
We discuss just how hard, or not, responsible disclosure really is, share some sad news about the status of BTRFS on RHEL, a few more reasons to use ZFS.

Then, we find out if our passwords have been cracked, reveal Dan’s password hashes live on air & more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+MeYW-WXg ]]>
Episode 330: Netflix Lab Rats | TechSNAP 330 https://techsnap.systems/330 7A7B04AF-983F-445E-82B8-B4ADD4E5B30B Wed, 02 Aug 2017 00:18:03 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Dan finds a story of a major data leak isn't quite what it seems, a new Talos report that shows a large number of unpatched & unprotected memcached servers. Plus, between some excellent feedback & Dan's adventures, we've got a itty bitty ZFS deep dive. 1:21:26 false Dan does some sleuthing & finds that the story of a major data leak isn't quite what it seems, then a new Talos report that shows a large number of unpatched & unprotected memcached servers. We discuss just how bad that might be. Plus, between some excellent feedback & Dan's recent adventures, we've got a itty bitty ZFS deep dive.

And of course your feedback, a fantastic round-up & so much more on this week's episode of TechSNAP.

]]>
Dan does some sleuthing & finds that the story of a major data leak isn't quite what it seems, then a new Talos report that shows a large number of unpatched & unprotected memcached servers. We discuss just how bad that might be. Plus, between some excellent feedback & Dan's recent adventures, we've got a itty bitty ZFS deep dive.

And of course your feedback, a fantastic round-up & so much more on this week's episode of TechSNAP.

]]>
Dan does some sleuthing & finds that the story of a major data leak isn't quite what it seems, then a new Talos report that shows a large number of unpatched & unprotected memcached servers. We discuss just how bad that might be. Plus, between some excellent feedback & Dan's recent adventures, we've got a itty bitty ZFS deep dive.

And of course your feedback, a fantastic round-up & so much more on this week's episode of TechSNAP.

]]>
https://fireside.fm/player/v2/sHzmXDIv+jtL1S50i ]]>
Episode 329: Teeny Weeny DNS Server | TechSNAP 329 https://techsnap.systems/329 01349BC8-D756-4FED-B00D-9158E51EF87A Tue, 25 Jul 2017 23:28:58 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Some mysterious mac malware that's been lurking for years, a new tool to help you monitor, backup and generally work with your DNS infrastructure & possibly more problems for Symantec, the certificate authority who just can't seem to get things right. 1:21:56 false We've got the latest on some mysterious mac malware that's been lurking for years, a handy new tool to help you monitor, backup and generally work with your DNS infrastructure & possibly more problems for Symantec, the certificate authority who just can't seem to get things right.

]]>
We've got the latest on some mysterious mac malware that's been lurking for years, a handy new tool to help you monitor, backup and generally work with your DNS infrastructure & possibly more problems for Symantec, the certificate authority who just can't seem to get things right.

]]>
We've got the latest on some mysterious mac malware that's been lurking for years, a handy new tool to help you monitor, backup and generally work with your DNS infrastructure & possibly more problems for Symantec, the certificate authority who just can't seem to get things right.

]]>
https://fireside.fm/player/v2/sHzmXDIv+bFwebBpN ]]>
Episode 328: LetsEncrypt is a SNAP | TechSNAP 328 https://techsnap.systems/328 88E5C9EB-105E-4DA1-8A7D-D2B002913AA5 Tue, 18 Jul 2017 23:49:14 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting The recent ‘Devil’s Ivy’ vulnerability has caused quite a rash in the security journalism community. We discuss. Plus you’ve heard of public key encryption, but what lies beyond? We cover some possible alternatives and the problem of identity & more! 1:36:03 false The recent ‘Devil’s Ivy’ vulnerability has caused quite a rash in the security journalism community. Is it as bad as poison ivy or just a bunch of hyperbole? We discuss. Plus you’ve heard of public key encryption, but what lies beyond? We cover some possible alternatives and the problem of identity.

Then Dan’s got the latest on his Let’s encrypt setup including a brand new open source tool you too can use!

]]>
The recent ‘Devil’s Ivy’ vulnerability has caused quite a rash in the security journalism community. Is it as bad as poison ivy or just a bunch of hyperbole? We discuss. Plus you’ve heard of public key encryption, but what lies beyond? We cover some possible alternatives and the problem of identity.

Then Dan’s got the latest on his Let’s encrypt setup including a brand new open source tool you too can use!

]]>
The recent ‘Devil’s Ivy’ vulnerability has caused quite a rash in the security journalism community. Is it as bad as poison ivy or just a bunch of hyperbole? We discuss. Plus you’ve heard of public key encryption, but what lies beyond? We cover some possible alternatives and the problem of identity.

Then Dan’s got the latest on his Let’s encrypt setup including a brand new open source tool you too can use!

]]>
https://fireside.fm/player/v2/sHzmXDIv+4fQIAVyb ]]>
Episode 327: Unsecured IO | TechSNAP 327 https://techsnap.systems/327 358C04A2-5F50-4341-B0FE-66FCB643BF0A Wed, 12 Jul 2017 01:14:15 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting GNUPG has just released a fix for a dangerous side-channel attack, a leak of NASDAQ test data was picked up by real news organizations and caused a bit of a panic, a security researched who managed to take over all .io domains & more! 1:43:54 false GNUPG has just released a fix for a dangerous side-channel attack that could expose your private key, a leak of NASDAQ test data was picked up by real news organizations and caused a bit of a panic & the fascinating story of a security researched who managed to take over all .io domains with a little sleuthing and a few domain registrations.

Plus Dan's got so much new stuff it has its own segment, and of course your feedback, a fantastic round-up & so much more!

]]>
GNUPG has just released a fix for a dangerous side-channel attack that could expose your private key, a leak of NASDAQ test data was picked up by real news organizations and caused a bit of a panic & the fascinating story of a security researched who managed to take over all .io domains with a little sleuthing and a few domain registrations.

Plus Dan's got so much new stuff it has its own segment, and of course your feedback, a fantastic round-up & so much more!

]]>
GNUPG has just released a fix for a dangerous side-channel attack that could expose your private key, a leak of NASDAQ test data was picked up by real news organizations and caused a bit of a panic & the fascinating story of a security researched who managed to take over all .io domains with a little sleuthing and a few domain registrations.

Plus Dan's got so much new stuff it has its own segment, and of course your feedback, a fantastic round-up & so much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+ShTkLxAG ]]>
Episode 326: Broadband from Space | TechSNAP 326 https://techsnap.systems/326 535A1C7F-B8A6-493F-88F1-0210E049A3F0 Tue, 04 Jul 2017 23:54:02 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting A new satellite broadband ISP has approval to serve the US, UK Law enforcement claims that visiting the dark web is a potential sign of terrorism & a Krebs’ deep dive into the wild world of robocalls. Plus Dan’s latest Let’s Encrypt updates & more! 1:36:54 false A new satellite broadband ISP has approval to serve the US, are their low-latency claims too good to be true? UK Law enforcement claims that visiting the dark web is a potential sign of terrorism, watch out tor users! Then we follow a Krebs’ deep dive into the wild world of robocalls.



Plus Dan’s latest Let’s Encrypt updates, your fantastic feedback, a robust roundup & so much more!

]]>
A new satellite broadband ISP has approval to serve the US, are their low-latency claims too good to be true? UK Law enforcement claims that visiting the dark web is a potential sign of terrorism, watch out tor users! Then we follow a Krebs’ deep dive into the wild world of robocalls.



Plus Dan’s latest Let’s Encrypt updates, your fantastic feedback, a robust roundup & so much more!

]]>
A new satellite broadband ISP has approval to serve the US, are their low-latency claims too good to be true? UK Law enforcement claims that visiting the dark web is a potential sign of terrorism, watch out tor users! Then we follow a Krebs’ deep dive into the wild world of robocalls.



Plus Dan’s latest Let’s Encrypt updates, your fantastic feedback, a robust roundup & so much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+xKa8knr3 ]]>
Episode 325: Google Reads Your Email | TechSNAP 325 https://techsnap.systems/325 5858B530-04BF-4B16-89D8-EEFB0FC8F0D1 Tue, 27 Jun 2017 21:25:24 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting We go to air just as a massive cyberattack strikes Europe, Google stops reading your email, well sorta maybe & we discuss the latest debate over US government access to overseas data. Plus some fantastic feedback, a robust roundup & so much more! 1:21:08 false We go to air just as a massive cyberattack strikes Europe, Google stops reading your email, well sorta maybe & we discuss the latest debate over US government access to overseas data.

Plus some fantastic feedback, a robust roundup & so much more!

]]>
We go to air just as a massive cyberattack strikes Europe, Google stops reading your email, well sorta maybe & we discuss the latest debate over US government access to overseas data.

Plus some fantastic feedback, a robust roundup & so much more!

]]>
We go to air just as a massive cyberattack strikes Europe, Google stops reading your email, well sorta maybe & we discuss the latest debate over US government access to overseas data.

Plus some fantastic feedback, a robust roundup & so much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+0uzI39qC ]]>
Episode 324: DNS Mastery | TechSNAP 324 https://techsnap.systems/324 B32668AF-27C1-43E3-A9B5-C82CEE28786C Tue, 20 Jun 2017 23:07:31 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting We’ve got the latest on the ‘Stack Crash’ vulnerability affecting UNIX OSes. Plus thanks to a recent RNC data leak we’ve got your name, address, birthday & a lot more personal information! Then Dan does a deep dive on his DNS infrastructure & more! 1:42:36 false We’ve got the latest on the ‘Stack Crash’ vulnerability affecting a UNIX OS near you. Plus thanks to a recent RNC data leak we’ve got your name, address, birthday & a lot more personal information!

Then Dan does a deep dive on his DNS infrastructure, some recent improvements & his integration with Let’s Encrypt.


Plus some fantastic feedback, a robust roundup & so much more!

]]>
We’ve got the latest on the ‘Stack Crash’ vulnerability affecting a UNIX OS near you. Plus thanks to a recent RNC data leak we’ve got your name, address, birthday & a lot more personal information!

Then Dan does a deep dive on his DNS infrastructure, some recent improvements & his integration with Let’s Encrypt.


Plus some fantastic feedback, a robust roundup & so much more!

]]>
We’ve got the latest on the ‘Stack Crash’ vulnerability affecting a UNIX OS near you. Plus thanks to a recent RNC data leak we’ve got your name, address, birthday & a lot more personal information!

Then Dan does a deep dive on his DNS infrastructure, some recent improvements & his integration with Let’s Encrypt.


Plus some fantastic feedback, a robust roundup & so much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+d6XhqOqu ]]>
Episode 323: Comment & Control | TechSNAP 323 https://techsnap.systems/323 131ED4E6-1807-4280-AB90-720D495B8491 Wed, 14 Jun 2017 04:27:16 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Peanut butter, taps & a new library that's the source of all truth. Then the story of Britney Spears latest career move: controlling botnets through Instagram comments & Dan teaches us about steganography and how it helped catch an NSA leaker. 1:38:52 false Dan's back from BSDCAN with peanut butter, taps, and a new library that's the source of all truth. Then we've got the story of Britney Spears latest career move: controlling botnets through Instagram comments & Dan teaches us about steganography and how it helped catch an NSA leaker.


Plus some fantastic feedback, a robust roundup & so much more!

]]>
Dan's back from BSDCAN with peanut butter, taps, and a new library that's the source of all truth. Then we've got the story of Britney Spears latest career move: controlling botnets through Instagram comments & Dan teaches us about steganography and how it helped catch an NSA leaker.


Plus some fantastic feedback, a robust roundup & so much more!

]]>
Dan's back from BSDCAN with peanut butter, taps, and a new library that's the source of all truth. Then we've got the story of Britney Spears latest career move: controlling botnets through Instagram comments & Dan teaches us about steganography and how it helped catch an NSA leaker.


Plus some fantastic feedback, a robust roundup & so much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+-_JDZG9m ]]>
Episode 322: #NotMyInternet | TechSNAP 322 https://techsnap.systems/322 93C5196A-692F-4738-B73F-F8983B2FAE0C Tue, 06 Jun 2017 21:33:42 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting We discuss who really controls the internet & just how centralized and potentially vulnerable it has become. Plus the latest security letdowns from Windows 10, the story of a questionably ethical hacker & Zomato's data breach & so much more! 1:37:11 false We discuss who really controls the internet & just how centralized and potentially vulnerable it has become. Plus the latest security letdowns from Windows 10, the story of a questionably ethical hacker & Zomato's data breach.


Plus some fantastic feedback, a robust roundup & so much more!

]]>
We discuss who really controls the internet & just how centralized and potentially vulnerable it has become. Plus the latest security letdowns from Windows 10, the story of a questionably ethical hacker & Zomato's data breach.


Plus some fantastic feedback, a robust roundup & so much more!

]]>
We discuss who really controls the internet & just how centralized and potentially vulnerable it has become. Plus the latest security letdowns from Windows 10, the story of a questionably ethical hacker & Zomato's data breach.


Plus some fantastic feedback, a robust roundup & so much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+HCeo03cS ]]>
Episode 321: A Burrito Stole My Money | TechSNAP 321 https://techsnap.systems/321 B6523917-CD35-4F76-BE43-B6D81F7E7733 Tue, 30 May 2017 22:37:52 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Not only is the UK leaving the Eurozone, they’re starting their own internet with more surveillance! Then some top tips on getting recruited by the Israeli NSA & the details of some new WannaCry wannabes that may be infecting a windows server near you. 1:24:22 false Not only is the UK leaving the Eurozone, they are starting their own internet, this time with more surveillance! Then we’ve got some top tips on getting recruited by the Israeli NSA & the details of some new WannaCry wannabes that may be infecting a windows server near you.


Plus some fantastic feedback, a robust roundup & so much more!

]]>
Not only is the UK leaving the Eurozone, they are starting their own internet, this time with more surveillance! Then we’ve got some top tips on getting recruited by the Israeli NSA & the details of some new WannaCry wannabes that may be infecting a windows server near you.


Plus some fantastic feedback, a robust roundup & so much more!

]]>
Not only is the UK leaving the Eurozone, they are starting their own internet, this time with more surveillance! Then we’ve got some top tips on getting recruited by the Israeli NSA & the details of some new WannaCry wannabes that may be infecting a windows server near you.


Plus some fantastic feedback, a robust roundup & so much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+vLv3ylRJ ]]>
Episode 320: Kill Switch Engage | TechSNAP 320 https://techsnap.systems/320 64B3A9D1-23F0-4AE9-B8EB-4FFEBD0A0BB6 Tue, 23 May 2017 19:18:50 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting We've got another round of WannaCry analysis, the latest on the FCCs battle over Net neutrality. Then IPv6 Tunnels & you, a 2017 check-in. Plus some fantastic feedback, a robust roundup & so much more! 1:18:36 false We've got another round of WannaCry analysis, the latest on the FCCs battle over Net neutrality. Then IPv6 Tunnels & you, a 2017 check-in.

Plus some fantastic feedback, a robust roundup & so much more!

]]>
We've got another round of WannaCry analysis, the latest on the FCCs battle over Net neutrality. Then IPv6 Tunnels & you, a 2017 check-in.

Plus some fantastic feedback, a robust roundup & so much more!

]]>
We've got another round of WannaCry analysis, the latest on the FCCs battle over Net neutrality. Then IPv6 Tunnels & you, a 2017 check-in.

Plus some fantastic feedback, a robust roundup & so much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+UWLtfRKx ]]>
Episode 319: When IT Security Cries | TechSNAP 319 https://techsnap.systems/319 0CB2FB98-8A0B-4B0B-BDA2-A08390272C71 Tue, 16 May 2017 22:38:57 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting The WannaCry Worm has brought the world to tears. We've got the latest details, conspiracy theories, fallout & some tissues. Plus a keylogger that may be hiding in your audio driver, some great hardware recommendations from the audience & so much more! 1:20:13 false The WannaCry Worm has brought the world to tears. We've got the latest details, conspiracy theories, fallout & some tissues.

Plus a keylogger that may be hiding in your audio driver, some great hardware recommendations from the audience, your great feedback, a hard hitting round up & so much more!

]]>
The WannaCry Worm has brought the world to tears. We've got the latest details, conspiracy theories, fallout & some tissues.

Plus a keylogger that may be hiding in your audio driver, some great hardware recommendations from the audience, your great feedback, a hard hitting round up & so much more!

]]>
The WannaCry Worm has brought the world to tears. We've got the latest details, conspiracy theories, fallout & some tissues.

Plus a keylogger that may be hiding in your audio driver, some great hardware recommendations from the audience, your great feedback, a hard hitting round up & so much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+do00yJ5p ]]>
Episode 318: All Drives Die | TechSNAP 318 https://techsnap.systems/318 4ADFDB3A-C52D-4F57-B5D8-C3B79E3017AE Tue, 09 May 2017 21:42:09 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Turns out you've been doing passwords wrong, we've got guidance from NIST. Plus the latest numbers from BackBlaze with some interesting conclusions. Then, that google docs worm everyone's talking about, some top tips to stay safe & so much more! 1:19:10 false Turns out you've been doing passwords wrong, but don't worry, we've got the latest and greatest guidance from NIST. Plus the latest numbers from BackBlaze with some interesting conclusions about enterprise drives.

Then the details about that google docs worm everyone's talking about, some top tips to stay safe & so much more!

]]>
Turns out you've been doing passwords wrong, but don't worry, we've got the latest and greatest guidance from NIST. Plus the latest numbers from BackBlaze with some interesting conclusions about enterprise drives.

Then the details about that google docs worm everyone's talking about, some top tips to stay safe & so much more!

]]>
Turns out you've been doing passwords wrong, but don't worry, we've got the latest and greatest guidance from NIST. Plus the latest numbers from BackBlaze with some interesting conclusions about enterprise drives.

Then the details about that google docs worm everyone's talking about, some top tips to stay safe & so much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+oIWoUeC5 ]]>
Episode 317: Some Fishy Chips | TechSNAP 317 https://techsnap.systems/317 5077500E-5265-480D-9E29-4069FA05D1BC Wed, 03 May 2017 02:53:47 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Intel's patched a remote execution exploit that’s been lurking in their chips for the past nine years. Then Dan does a deep dive into friend of the show Tarsnap. Plus we discuss when we use external services versus building ourselves & much more! 1:38:13 false Intel's patched a remote execution exploit that’s been lurking in their chips for the past nine years, we’ve got the details & some handy tips to check if you’re affected. Then Dan does a deep dive into friend of the show Tarsnap: what it is, how to use it & why it’s so awesome. Plus we discuss when we use external services versus building ourselves & a few tips for lightweight backup solutions that might work for you.

Then your fantastic feedback, a riotous roundup & so much more!

]]>
Intel's patched a remote execution exploit that’s been lurking in their chips for the past nine years, we’ve got the details & some handy tips to check if you’re affected. Then Dan does a deep dive into friend of the show Tarsnap: what it is, how to use it & why it’s so awesome. Plus we discuss when we use external services versus building ourselves & a few tips for lightweight backup solutions that might work for you.

Then your fantastic feedback, a riotous roundup & so much more!

]]>
Intel's patched a remote execution exploit that’s been lurking in their chips for the past nine years, we’ve got the details & some handy tips to check if you’re affected. Then Dan does a deep dive into friend of the show Tarsnap: what it is, how to use it & why it’s so awesome. Plus we discuss when we use external services versus building ourselves & a few tips for lightweight backup solutions that might work for you.

Then your fantastic feedback, a riotous roundup & so much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+BAPykozN ]]>
Episode 316: PHP Steals Your Nuts | TechSNAP 316 https://techsnap.systems/316 5AE1CB2E-8C22-4479-9379-DA2AD42A4693 Wed, 26 Apr 2017 00:04:08 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting The guys discuss an unfortunate new vulnerability in Squirrelmail. Plus a new entrant to the anonymous domain name space from some of the internet’s most famous rabble rousers. Then Dan & Wes get a bit jealous of Canada’s take on net neutrality & more! 1:42:13 false The squirrels have gotten in the mailbag as the guys discuss an unfortunate new vulnerability in Squirrelmail. Plus an interesting new entrant to the anonymous domain name space from some of the internet’s most famous rabble rousers. Then Dan & Wes get just a bit jealous of Canada’s new take on net neutrality & more!

]]>
The squirrels have gotten in the mailbag as the guys discuss an unfortunate new vulnerability in Squirrelmail. Plus an interesting new entrant to the anonymous domain name space from some of the internet’s most famous rabble rousers. Then Dan & Wes get just a bit jealous of Canada’s new take on net neutrality & more!

]]>
The squirrels have gotten in the mailbag as the guys discuss an unfortunate new vulnerability in Squirrelmail. Plus an interesting new entrant to the anonymous domain name space from some of the internet’s most famous rabble rousers. Then Dan & Wes get just a bit jealous of Canada’s new take on net neutrality & more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+fX-48x_d ]]>
Episode 315: Tales of FileSystems | TechSNAP 315 https://techsnap.systems/315 919B9614-2A41-4544-9BDB-6514D7487C65 Tue, 18 Apr 2017 21:57:56 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting We’ve got the latest gossip on Apple’s brand new filesystem, Plus Dan dives deep into the world of ZFS and FreeBSD jails & shows us how he is putting them to use in his latest server build. Plus your fantastic feedback, a riotous roundup & so much more! 1:36:51 false We’ve got the latest gossip on Apple’s brand new filesystem & why you should care! Plus Dan dives deep into the wonderful world of ZFS and FreeBSD jails & shows us how he is putting them to use in his latest server build.

Plus it’s your fantastic feedback, a riotous roundup & so much more!

]]>
We’ve got the latest gossip on Apple’s brand new filesystem & why you should care! Plus Dan dives deep into the wonderful world of ZFS and FreeBSD jails & shows us how he is putting them to use in his latest server build.

Plus it’s your fantastic feedback, a riotous roundup & so much more!

]]>
We’ve got the latest gossip on Apple’s brand new filesystem & why you should care! Plus Dan dives deep into the wonderful world of ZFS and FreeBSD jails & shows us how he is putting them to use in his latest server build.

Plus it’s your fantastic feedback, a riotous roundup & so much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+yvVfsWuK ]]>
Episode 314: Cyber Liability | TechSNAP 314 https://techsnap.systems/314 99470104-3B5B-49BD-8C95-4180DC77493A Wed, 12 Apr 2017 03:13:41 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting We cover some new research that can steal your phone’s PIN using just the on-board sensors. Then we cover how computer security is broken from top to bottom, Dan does another deep dive, this time on everyone’s favorite database, PostgresSQ & more! 1:44:42 false We cover some fascinating new research that can steal your phone’s PIN using just the on-board sensors. Then we cover how computer security is broken from top to bottom and Dan does another deep dive, this time on everyone’s favorite database, PostgresSQL.

Plus it’s your feedback, a huge roundup & so much more!

]]>
We cover some fascinating new research that can steal your phone’s PIN using just the on-board sensors. Then we cover how computer security is broken from top to bottom and Dan does another deep dive, this time on everyone’s favorite database, PostgresSQL.

Plus it’s your feedback, a huge roundup & so much more!

]]>
We cover some fascinating new research that can steal your phone’s PIN using just the on-board sensors. Then we cover how computer security is broken from top to bottom and Dan does another deep dive, this time on everyone’s favorite database, PostgresSQL.

Plus it’s your feedback, a huge roundup & so much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+SAdI5DHO ]]>
Episode 313: Wifi Stack Overfloweth | TechSNAP 313 https://techsnap.systems/313 32951009-A775-4AA3-8780-619AD9C9749D Wed, 05 Apr 2017 02:04:35 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Your Wifi Stack is under attack! But dont worry, Apple’s got the patch & we’ve got the story. Then the latest ATM hacking tips that will only cost you $15 & Dan does a deep dive into Let’s Encrypt! Plus it’s your feedback, a huge roundup & so much more! 1:41:34 false Your Wifi Stack is under attack! But dont worry, Apple’s got the patch & we’ve got the story. Then the latest ATM hacking tips that will only cost you $15 & Dan does a deep dive into Let’s Encrypt!

Plus it’s your feedback, a huge roundup & so much more!

]]>
Your Wifi Stack is under attack! But dont worry, Apple’s got the patch & we’ve got the story. Then the latest ATM hacking tips that will only cost you $15 & Dan does a deep dive into Let’s Encrypt!

Plus it’s your feedback, a huge roundup & so much more!

]]>
Your Wifi Stack is under attack! But dont worry, Apple’s got the patch & we’ve got the story. Then the latest ATM hacking tips that will only cost you $15 & Dan does a deep dive into Let’s Encrypt!

Plus it’s your feedback, a huge roundup & so much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+_sBiriSn ]]>
Episode 312: Privacy is Dead | TechSNAP 312 https://techsnap.systems/312 5E50C834-89DB-4219-8EC0-C0E948201876 Wed, 29 Mar 2017 01:34:54 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting This week, we cover the latest rollback of internet privacy regulations in the US, plus the story of script kiddies getting their day in court & Dan does a not-so-deep dive into ZFS . Plus it’s your feedback, a huge roundup & so much more! 1:42:50 false This week, we sell your private browsing history to the highest bidder! Oh wait, that’s your ISP! We cover the latest rollback of internet privacy regulations in the US, plus the surprisingly uplifting story of script kiddies getting their day in court, Dan does a not-so-deep dive into ZFS & explains why you should already be using it.

Plus it’s your feedback, a huge roundup & so much more!

]]>
This week, we sell your private browsing history to the highest bidder! Oh wait, that’s your ISP! We cover the latest rollback of internet privacy regulations in the US, plus the surprisingly uplifting story of script kiddies getting their day in court, Dan does a not-so-deep dive into ZFS & explains why you should already be using it.

Plus it’s your feedback, a huge roundup & so much more!

]]>
This week, we sell your private browsing history to the highest bidder! Oh wait, that’s your ISP! We cover the latest rollback of internet privacy regulations in the US, plus the surprisingly uplifting story of script kiddies getting their day in court, Dan does a not-so-deep dive into ZFS & explains why you should already be using it.

Plus it’s your feedback, a huge roundup & so much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+4N4mw1Ym ]]>
Episode 311: Check Yo Checksum | TechSNAP 311 https://techsnap.systems/311 42DA225B-4041-4E04-8556-A0B534C6C67C Wed, 22 Mar 2017 02:11:34 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting The guys break with the usual format & turn things over to Dan for a deep deep dive on Bacula! Then it’s the latest Yahoo hack news & a few more reasons you should already be using ZFS. Plus it’s your feedback, a huge roundup & so much more! 2:01:46 false The guys break with the usual format & turn things over to Dan for a deep deep dive on Bacula! Then it’s the latest Yahoo hack news & a few more reasons you should already be using ZFS.

Plus it’s your feedback, a huge roundup & so much more!

]]>
The guys break with the usual format & turn things over to Dan for a deep deep dive on Bacula! Then it’s the latest Yahoo hack news & a few more reasons you should already be using ZFS.

Plus it’s your feedback, a huge roundup & so much more!

]]>
The guys break with the usual format & turn things over to Dan for a deep deep dive on Bacula! Then it’s the latest Yahoo hack news & a few more reasons you should already be using ZFS.

Plus it’s your feedback, a huge roundup & so much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+AzbMqbiE ]]>
Episode 310: Don’t Panic & P your S | TechSNAP 310 https://techsnap.systems/310 9B9F2E5D-7653-4E79-85DA-4A11D4B0D6D8 Tue, 14 Mar 2017 23:10:36 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting We crack open Vault 7 & are let down by what's inside, give you one more reason you should already be using ZFS & you thought you could trust your phone again, we’ve got the story of preinstalled Android malware. Then it’s feedback, the roundup & more! 1:27:49 false We crack open Vault 7 & are a little let down by what's inside, give you one more reason you should already be using ZFS & just when you thought you could trust your phone again, we’ve got the story of preinstalled Android malware. Then it’s your feedback, a huge roundup & so much more!

]]>
We crack open Vault 7 & are a little let down by what's inside, give you one more reason you should already be using ZFS & just when you thought you could trust your phone again, we’ve got the story of preinstalled Android malware. Then it’s your feedback, a huge roundup & so much more!

]]>
We crack open Vault 7 & are a little let down by what's inside, give you one more reason you should already be using ZFS & just when you thought you could trust your phone again, we’ve got the story of preinstalled Android malware. Then it’s your feedback, a huge roundup & so much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+Jgn9yLa6 ]]>
Episode 309: Bad Boy Backups | TechSNAP 309 https://techsnap.systems/309 2A8C0656-0A25-4A2D-8363-E1AE2626091B Tue, 07 Mar 2017 21:48:59 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting We’ve got the sad story of cloud-enabled toys leading to, you guessed it, leaking customer’s personal information! Plus a case of backups gone bad, but this time, it’s a good thing! Then it’s your feedback, a huge roundup, and so much more! 1:30:31 false We’ve got the sad story of cloud-enabled toys leading to, you guessed it, leaking customer’s personal information! Plus a case of backups gone bad, but this time, it’s a good thing!

Then it’s your feedback, a huge roundup, and so much more!

]]>
We’ve got the sad story of cloud-enabled toys leading to, you guessed it, leaking customer’s personal information! Plus a case of backups gone bad, but this time, it’s a good thing!

Then it’s your feedback, a huge roundup, and so much more!

]]>
We’ve got the sad story of cloud-enabled toys leading to, you guessed it, leaking customer’s personal information! Plus a case of backups gone bad, but this time, it’s a good thing!

Then it’s your feedback, a huge roundup, and so much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+LXa3ke80 ]]>
Episode 308: Cloudy with a Chance of Leaks | TechSNAP 308 https://techsnap.systems/308 27A9FEB4-08B4-4175-A6A9-0A1A8D2BDE97 Tue, 28 Feb 2017 21:40:13 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Google heard you like hashes so they broke SHA1, we've got the details. Plus we dive in to Cloudflare's data disaster, Dan shows us his rack, your feedback, a huge roundup & so much more! 1:21:45 false Google heard you like hashes so they broke SHA1, we've got the details.

Plus we dive in to Cloudflare's data disaster, Dan shows us his rack, your feedback, a huge roundup & so much more!

]]>
Google heard you like hashes so they broke SHA1, we've got the details.

Plus we dive in to Cloudflare's data disaster, Dan shows us his rack, your feedback, a huge roundup & so much more!

]]>
Google heard you like hashes so they broke SHA1, we've got the details.

Plus we dive in to Cloudflare's data disaster, Dan shows us his rack, your feedback, a huge roundup & so much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+EvIh1CJR ]]>
Episode 307: State Sponsored Audiophiles | TechSNAP 307 https://techsnap.systems/307 8ED56ED6-D8D5-47B9-B1CA-80D78DB58E4D Tue, 21 Feb 2017 21:44:00 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting The details on the latest WordPress vulnerability, then the perhaps not so surprising takeover of a cybersecurity firms website & watch out, hacker's may be using your microphone to steal your data! Plus a packed roundup, your feedback & so much more! 1:07:03 false The details on the latest WordPress vulnerability, then the surprising, or perhaps not so surprising takeover of a cybersecurity firms website & watch out, hacker's may be using your microphone to steal your data!

Plus a packed roundup, your feedback & so much more!

]]>
The details on the latest WordPress vulnerability, then the surprising, or perhaps not so surprising takeover of a cybersecurity firms website & watch out, hacker's may be using your microphone to steal your data!

Plus a packed roundup, your feedback & so much more!

]]>
The details on the latest WordPress vulnerability, then the surprising, or perhaps not so surprising takeover of a cybersecurity firms website & watch out, hacker's may be using your microphone to steal your data!

Plus a packed roundup, your feedback & so much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+00ouCR3R ]]>
Episode 306: Metadata Matters | TechSNAP 306 https://techsnap.systems/306 810F2BA3-6C7E-4C4D-A2DF-10C715D049D4 Wed, 15 Feb 2017 00:11:40 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting The latest on just who has access to your private email, Dan dives deep on the GitLab Postmortem & did you know that Transport for London has been tracking your wifi? We’ve got the details. Plus a packed roundup, your feedback & so much more! 1:57:38 false The latest on just who has access to your private email, Dan dives deep on the GitLab Postmortem & did you know that Transport for London has been tracking your wifi? We’ve got the details.

Plus a packed roundup, your feedback & so much more!

]]>
The latest on just who has access to your private email, Dan dives deep on the GitLab Postmortem & did you know that Transport for London has been tracking your wifi? We’ve got the details.

Plus a packed roundup, your feedback & so much more!

]]>
The latest on just who has access to your private email, Dan dives deep on the GitLab Postmortem & did you know that Transport for London has been tracking your wifi? We’ve got the details.

Plus a packed roundup, your feedback & so much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+nNyiNJZa ]]>
Episode 305: Gambling with Code | TechSNAP 305 https://techsnap.systems/305 AA14B4E3-B9CF-44CD-AE65-1484B5282FC3 Tue, 07 Feb 2017 23:52:21 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting We’ve got the latest on GitLabs data disaster, a clever new method to cheat at the slots & a new Netgear exploit thats coming for your network! Plus your feedback, a giant roundup & much, much more! 1:45:08 false We’ve got the latest on GitLabs data disaster, a clever new method to cheat at the slots & a new Netgear exploit thats coming for your network!

Plus your feedback, a giant roundup & much, much more!

]]>
We’ve got the latest on GitLabs data disaster, a clever new method to cheat at the slots & a new Netgear exploit thats coming for your network!

Plus your feedback, a giant roundup & much, much more!

]]>
We’ve got the latest on GitLabs data disaster, a clever new method to cheat at the slots & a new Netgear exploit thats coming for your network!

Plus your feedback, a giant roundup & much, much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+1fIeDGRU ]]>
Episode 304: Three C's to Tweet By | TechSNAP 304 https://techsnap.systems/304 FC4CA247-AA35-4B56-8318-3222EE557B66 Wed, 01 Feb 2017 01:25:19 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting The guys cover Dropbox bugs that could be holding on to your deleted files, explain what the heck ATM ‘shimmers’ are & talk about how to keep your secret identity secret. Plus your feedback, a packed roundup & much more! 1:38:04 false The guys cover Dropbox bugs that could be holding on to your deleted files, explain what the heck ATM ‘shimmers’ are & talk about how to keep your secret identity secret.

Plus your feedback, a packed roundup & much more!

]]>
The guys cover Dropbox bugs that could be holding on to your deleted files, explain what the heck ATM ‘shimmers’ are & talk about how to keep your secret identity secret.

Plus your feedback, a packed roundup & much more!

]]>
The guys cover Dropbox bugs that could be holding on to your deleted files, explain what the heck ATM ‘shimmers’ are & talk about how to keep your secret identity secret.

Plus your feedback, a packed roundup & much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+vKekULEf ]]>
Episode 303: DDos Mafia | TechSNAP 303 https://techsnap.systems/303 B3675005-B84C-49B4-A7C2-3E0556691505 Tue, 24 Jan 2017 22:42:17 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting A remote vulnerability in Ansible has been patched, the latest updates on the Mirai botnet, our first TechSNAP challenge, your feedback, a gigantic roundup & so much more! 1:03:28 false A remote vulnerability in Ansible has been patched, the latest updates on the Mirai botnet, our first TechSNAP challenge, your feedback, a gigantic roundup & so much more!

]]>
A remote vulnerability in Ansible has been patched, the latest updates on the Mirai botnet, our first TechSNAP challenge, your feedback, a gigantic roundup & so much more!

]]>
A remote vulnerability in Ansible has been patched, the latest updates on the Mirai botnet, our first TechSNAP challenge, your feedback, a gigantic roundup & so much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+wxZEf_6t ]]>
Episode 302: Internet of Voice Triggers | TechSNAP 302 https://techsnap.systems/302 CEBCF7B1-3D39-43CF-AEAC-27C7ADC18B9D Tue, 17 Jan 2017 07:43:18 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting The Github enterprise SQL scare, malware that lives in your browser, Dan’s mail server war story, your feedback, a righteous roundup & more! Note: Shorter episode because the guys are new and as also a double recording, expect longer episodes over time! 37:34 false The Github enterprise SQL scare, malware that lives in your browser, Dan’s mail server war story, your feedback, a righteous roundup & more!

Note: This is a shorter episode because the hosts are new and the first recording was also a double episode recording, expect them to get longer as the guys get more comfortable!

]]>
The Github enterprise SQL scare, malware that lives in your browser, Dan’s mail server war story, your feedback, a righteous roundup & more!

Note: This is a shorter episode because the hosts are new and the first recording was also a double episode recording, expect them to get longer as the guys get more comfortable!

]]>
The Github enterprise SQL scare, malware that lives in your browser, Dan’s mail server war story, your feedback, a righteous roundup & more!

Note: This is a shorter episode because the hosts are new and the first recording was also a double episode recording, expect them to get longer as the guys get more comfortable!

]]>
https://fireside.fm/player/v2/sHzmXDIv+YanPcafq ]]>
Episode 301: The Next Generation | TechSNAP 301 https://techsnap.systems/301 2E9AD9A8-0001-45FE-8D87-0EE2A6097784 Tue, 10 Jan 2017 21:22:09 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Malware that evades blocking systems and getting into BSD for the first time. Plus a fresh round up, your questions & much, much more! 38:58 false Malware that evades blocking systems and getting into BSD for the first time.

Plus a fresh round up, your questions & much, much more!

]]>
Malware that evades blocking systems and getting into BSD for the first time.

Plus a fresh round up, your questions & much, much more!

]]>
Malware that evades blocking systems and getting into BSD for the first time.

Plus a fresh round up, your questions & much, much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+IhVMYWZ- ]]>
Episode 300: 2089 Days Uptime | TechSNAP 300 https://techsnap.systems/300 85B9FE8E-BBE5-4743-A6E4-DE1843D9C31F Thu, 05 Jan 2017 21:11:40 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting How the hack of DigiNotar changed the infrastructure of the Internet forever, changing the way we think about security & how to hide malware in a PNG. Plus a packed round up, great emails & more in a packed 300th episode! 2:13:06 false How the hack of DigiNotar changed the infrastructure of the Internet forever, changing the way we think about security & how to hide malware in a PNG.

Plus a packed round up, great emails & more in a packed 300th episode!

]]>
How the hack of DigiNotar changed the infrastructure of the Internet forever, changing the way we think about security & how to hide malware in a PNG.

Plus a packed round up, great emails & more in a packed 300th episode!

]]>
How the hack of DigiNotar changed the infrastructure of the Internet forever, changing the way we think about security & how to hide malware in a PNG.

Plus a packed round up, great emails & more in a packed 300th episode!

]]>
https://fireside.fm/player/v2/sHzmXDIv+-ZPXOHBw ]]>
Episode 299: Fancy Bear Misfire.apk | TechSNAP 299 https://techsnap.systems/299 B1B837EA-5074-42D0-A1D7-FBD3FF7BF2F6 Thu, 29 Dec 2016 18:44:14 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting PHPMailer puts almost every PHP CMS at risk, the Fancy Bear Android Malware that has a complicated past & the new botnet that likes brag. Plus great questions, a packed round up & much, much more! 1:33:10 false PHPMailer puts almost every PHP CMS at risk, the Fancy Bear Android Malware that has a complicated past & the new botnet that likes brag.

Plus great questions, a packed round up & much, much more!

]]>
PHPMailer puts almost every PHP CMS at risk, the Fancy Bear Android Malware that has a complicated past & the new botnet that likes brag.

Plus great questions, a packed round up & much, much more!

]]>
PHPMailer puts almost every PHP CMS at risk, the Fancy Bear Android Malware that has a complicated past & the new botnet that likes brag.

Plus great questions, a packed round up & much, much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+V-DwpFQU ]]>
Episode 298: Best of 2016 | TechSNAP 298 https://techsnap.systems/298 E96BEA4A-083E-44F0-96C7-FC1902C25D99 Thu, 22 Dec 2016 10:40:03 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting We've given the Jupiter Broadcasting staff the holidays off, so lets take this moment to have a look back at some of the best moments of TechSNAP in 2016! 1:30:20 false We've given the Jupiter Broadcasting staff the holidays off, so lets take this moment to have a look back at some of the best moments of TechSNAP in 2016!

]]>
We've given the Jupiter Broadcasting staff the holidays off, so lets take this moment to have a look back at some of the best moments of TechSNAP in 2016!

]]>
We've given the Jupiter Broadcasting staff the holidays off, so lets take this moment to have a look back at some of the best moments of TechSNAP in 2016!

]]>
https://fireside.fm/player/v2/sHzmXDIv+LzBnLLXT ]]>
Episode 297: The Bourne Avalanche | TechSNAP 297 https://techsnap.systems/297 C2DE5F02-1932-4829-BC76-B930758F70F7 Thu, 15 Dec 2016 20:19:25 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting The Malvertising campaign that targets routers, script kiddies get a talking to & the Avalanche crime ringleader is on the run. Plus your questions, a packed round up & more! 1:33:04 false The Malvertising campaign that targets routers, script kiddies get a talking to & the Avalanche crime ringleader is on the run.

Plus your questions, a packed round up & more!

]]>
The Malvertising campaign that targets routers, script kiddies get a talking to & the Avalanche crime ringleader is on the run.

Plus your questions, a packed round up & more!

]]>
The Malvertising campaign that targets routers, script kiddies get a talking to & the Avalanche crime ringleader is on the run.

Plus your questions, a packed round up & more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+PwFHZiTk ]]>
Episode 296: Schoolhouse Exploits | TechSNAP 296 https://techsnap.systems/296 B8406FD7-9E08-4CE9-A436-7C5E48B1138C Thu, 08 Dec 2016 21:39:31 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Project Zero breaks the chain, we share stories from our mischievous past & malware as a service gets busted. Plus your great questions, a packed round up & much, much more! 1:39:53 false Project Zero breaks the chain, we share stories from our mischievous past & malware as a service gets busted.

Plus your great questions, a packed round up & much, much more!

]]>
Project Zero breaks the chain, we share stories from our mischievous past & malware as a service gets busted.

Plus your great questions, a packed round up & much, much more!

]]>
Project Zero breaks the chain, we share stories from our mischievous past & malware as a service gets busted.

Plus your great questions, a packed round up & much, much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+hr5cd6J5 ]]>
Episode 295: Shift+F10 and Done | TechSNAP 295 https://techsnap.systems/295 3D6105CA-56B1-4CD4-A088-D8E76217DF08 Thu, 01 Dec 2016 19:58:57 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting A researcher accidentally roots Microsoft Azure’s Red Hat Update Infrastructure, newly discovered router flaw in-the-wild & hacking Windows 10 by holding down the shift key. Plus your questions, our answers & a great round up! 1:34:22 false A researcher accidentally roots Microsoft Azure’s Red Hat Update Infrastructure, newly discovered router flaw in-the-wild & hacking Windows 10 by holding down the shift key.

Plus your questions, our answers & a great round up!

]]>
A researcher accidentally roots Microsoft Azure’s Red Hat Update Infrastructure, newly discovered router flaw in-the-wild & hacking Windows 10 by holding down the shift key.

Plus your questions, our answers & a great round up!

]]>
A researcher accidentally roots Microsoft Azure’s Red Hat Update Infrastructure, newly discovered router flaw in-the-wild & hacking Windows 10 by holding down the shift key.

Plus your questions, our answers & a great round up!

]]>
https://fireside.fm/player/v2/sHzmXDIv+1XtXL8de ]]>
Episode 294: Turkey.deb | TechSNAP 294 https://techsnap.systems/294 146347C0-20FF-47A2-9368-F6CF459DABEE Thu, 24 Nov 2016 18:37:07 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting The Debian packaging flaw that exposes your server, we go over the state of the Internet... report that is & hacking 27% of the web. Plus some great questions, a fantastic round up & much, much more! 1:32:36 false The Debian packaging flaw that exposes your server, we go over the state of the Internet... report that is & hacking 27% of the web.

Plus some great questions, a fantastic round up & much, much more!

]]>
The Debian packaging flaw that exposes your server, we go over the state of the Internet... report that is & hacking 27% of the web.

Plus some great questions, a fantastic round up & much, much more!

]]>
The Debian packaging flaw that exposes your server, we go over the state of the Internet... report that is & hacking 27% of the web.

Plus some great questions, a fantastic round up & much, much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+Q5TnGziZ ]]>
Episode 293: Root in 70 Seconds | TechSNAP 293 https://techsnap.systems/293 07088798-74D4-4F9C-8136-DF23448E2E5D Thu, 17 Nov 2016 23:49:30 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Get a root shell by holding down enter, comprising a Linux desktop using an NES & PoisonTap, the impressive little hacking tool. Plus your great questions, a poppin’ round up & much, much more! 2:05:55 false Get a root shell by holding down enter, comprising a Linux desktop using an NES & PoisonTap, the impressive little hacking tool.

Plus your great questions, a poppin’ round up & much, much more!

]]>
Get a root shell by holding down enter, comprising a Linux desktop using an NES & PoisonTap, the impressive little hacking tool.

Plus your great questions, a poppin’ round up & much, much more!

]]>
Get a root shell by holding down enter, comprising a Linux desktop using an NES & PoisonTap, the impressive little hacking tool.

Plus your great questions, a poppin’ round up & much, much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+2T03YWnb ]]>
Episode 292: Unix Security Trifecta | TechSNAP 292 https://techsnap.systems/292 FA670FC3-699B-424D-955A-EB0EBA13FEE9 Thu, 10 Nov 2016 08:51:06 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting It’s a trifecta of Unix vulnerabilities, our concerns with LessPass & a very valuable vulnerability. Plus your questions, our answers, a spicy round up & much, much more! 1:44:23 false It’s a trifecta of Unix vulnerabilities, our concerns with LessPass & a very valuable vulnerability.

Plus your questions, our answers, a spicy round up & much, much more!

]]>
It’s a trifecta of Unix vulnerabilities, our concerns with LessPass & a very valuable vulnerability.

Plus your questions, our answers, a spicy round up & much, much more!

]]>
It’s a trifecta of Unix vulnerabilities, our concerns with LessPass & a very valuable vulnerability.

Plus your questions, our answers, a spicy round up & much, much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+xc7zIeXo ]]>
Episode 291: Nuclear IoT Toaster | TechSNAP 291 https://techsnap.systems/291 7B2E0A4F-4B49-4DD0-9E80-D71F28351AE1 Thu, 03 Nov 2016 01:50:19 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting We go deep into sophisticated modular malware & meet the manufacturer who vows to recall their IoT devices used in recent attacks. Plus home server questions, a fun round-up & more! 1:08:18 false We go deep into sophisticated modular malware & meet the manufacturer who vows to recall their IoT devices used in recent attacks.

Plus home server questions, a fun round-up & more!

]]>
We go deep into sophisticated modular malware & meet the manufacturer who vows to recall their IoT devices used in recent attacks.

Plus home server questions, a fun round-up & more!

]]>
We go deep into sophisticated modular malware & meet the manufacturer who vows to recall their IoT devices used in recent attacks.

Plus home server questions, a fun round-up & more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+5Wq0QZ3s ]]>
Episode 290: Internet Snow Day | TechSNAP 290 https://techsnap.systems/290 131ECEB0-9245-4405-83DA-CBF93D98035D Thu, 27 Oct 2016 17:27:33 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting A large managed DNS provider was taken down by a DDoS, we'll tell you all about Dyn’s big outage. Then we beat the dead dirty CoW, answer your questions, a breaking news round up & more! 1:23:13 false A large managed DNS provider was taken down by a DDoS, we'll tell you all about Dyn’s big outage.

Then we beat the dead dirty CoW, answer your questions, a breaking news round up & more!

]]>
A large managed DNS provider was taken down by a DDoS, we'll tell you all about Dyn’s big outage.

Then we beat the dead dirty CoW, answer your questions, a breaking news round up & more!

]]>
A large managed DNS provider was taken down by a DDoS, we'll tell you all about Dyn’s big outage.

Then we beat the dead dirty CoW, answer your questions, a breaking news round up & more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+EgwoOx-5 ]]>
Episode 289: Long Broken SSL History | TechSNAP 289 https://techsnap.systems/289 17E570EE-C1C8-4E65-AFAE-DA96F0F85F6A Fri, 21 Oct 2016 00:25:01 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Spreading the DDoS Disease & selling the cure, we have the audit results of TrueCrypt’s replacement & a comprehensive history of the most important events that shaped the SSL ecosystem. Plus your great questions, our answers & much... Much MORE! 2:41:38 false Spreading the DDoS Disease & selling the cure, we have the audit results of TrueCrypt’s replacement & a comprehensive history of the most important events that shaped the SSL ecosystem.

Plus your great questions, our answers & much... Much MORE!

]]>
Spreading the DDoS Disease & selling the cure, we have the audit results of TrueCrypt’s replacement & a comprehensive history of the most important events that shaped the SSL ecosystem.

Plus your great questions, our answers & much... Much MORE!

]]>
Spreading the DDoS Disease & selling the cure, we have the audit results of TrueCrypt’s replacement & a comprehensive history of the most important events that shaped the SSL ecosystem.

Plus your great questions, our answers & much... Much MORE!

]]>
https://fireside.fm/player/v2/sHzmXDIv+anvCEZNO ]]>
Episode 288: Internet of Default Passwords | TechSNAP 288 https://techsnap.systems/288 8316F4C4-F280-4102-82B7-BBF3DB55D833 Fri, 14 Oct 2016 01:48:55 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting The Internet of Things is the Internet of Terrible, we’ll round up the week’s stories & submit the TechSNAP solution to you the audience. Plus the security cost of Android fragmentation, great questions & a packed round up! 1:40:03 false The Internet of Things is the Internet of Terrible, we’ll round up the week’s stories & submit the TechSNAP solution to you the audience. Plus the security cost of Android fragmentation, great questions & a packed round up!

]]>
The Internet of Things is the Internet of Terrible, we’ll round up the week’s stories & submit the TechSNAP solution to you the audience. Plus the security cost of Android fragmentation, great questions & a packed round up!

]]>
The Internet of Things is the Internet of Terrible, we’ll round up the week’s stories & submit the TechSNAP solution to you the audience. Plus the security cost of Android fragmentation, great questions & a packed round up!

]]>
https://fireside.fm/player/v2/sHzmXDIv+C3WmeCYP ]]>
Episode 287: Open Source Botnet | TechSNAP 287 https://techsnap.systems/287 64B3770B-51AD-424A-9989-0395D94E62DF Thu, 06 Oct 2016 21:21:31 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting The Source code for a historic botnet has been released, the tale of a DNS packet & four ways to hack ATMs. Plus your hard questions, our answers, a rockin' roundup & more! 2:12:58 false The Source code for a historic botnet has been released, the tale of a DNS packet & four ways to hack ATMs.

Plus your hard questions, our answers, a rockin' roundup & more!

]]>
The Source code for a historic botnet has been released, the tale of a DNS packet & four ways to hack ATMs.

Plus your hard questions, our answers, a rockin' roundup & more!

]]>
The Source code for a historic botnet has been released, the tale of a DNS packet & four ways to hack ATMs.

Plus your hard questions, our answers, a rockin' roundup & more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+wxEVzWbX ]]>
Episode 286: Botnet of Things | TechSNAP 286 https://techsnap.systems/286 504CC113-DF48-4DEC-8367-866CAE58F9C0 Thu, 29 Sep 2016 20:15:58 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Krebs is hit with DDoS attack & then gets kicked off of Akamai. We’ll tell you about the record breaking details, Firefox puts it foot down, picking NFS or Samba… Your questions, our answers, a packed Round Up & much more! 2:06:57 false Krebs is hit with DDoS attack & then gets kicked off of Akamai. We’ll tell you about the record breaking details, Firefox puts it foot down, picking NFS or Samba…

Your questions, our answers, a packed Round Up & much more!

]]>
Krebs is hit with DDoS attack & then gets kicked off of Akamai. We’ll tell you about the record breaking details, Firefox puts it foot down, picking NFS or Samba…

Your questions, our answers, a packed Round Up & much more!

]]>
Krebs is hit with DDoS attack & then gets kicked off of Akamai. We’ll tell you about the record breaking details, Firefox puts it foot down, picking NFS or Samba…

Your questions, our answers, a packed Round Up & much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+5vNVWfzK ]]>
Episode 285: OpSec for Script Kiddies | TechSNAP 285 https://techsnap.systems/285 E99993BB-527A-4800-ADF4-668EDF08843F Thu, 22 Sep 2016 08:34:53 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting The FBI arrests the script kiddies that hacked the CIA director, how Dropbox hacks your Mac & the guys behind a DDoS for hire service get busted. Plus great questions, our answers, a rockin roundup & more! 1:01:32 false The FBI arrests the script kiddies that hacked the CIA director, how Dropbox hacks your Mac & the guys behind a DDoS for hire service get busted.

Plus great questions, our answers, a rockin roundup & more!

]]>
The FBI arrests the script kiddies that hacked the CIA director, how Dropbox hacks your Mac & the guys behind a DDoS for hire service get busted.

Plus great questions, our answers, a rockin roundup & more!

]]>
The FBI arrests the script kiddies that hacked the CIA director, how Dropbox hacks your Mac & the guys behind a DDoS for hire service get busted.

Plus great questions, our answers, a rockin roundup & more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+EteUgAKb ]]>
Episode 284: Buffalo Overflow | TechSNAP 284 https://techsnap.systems/284 310BA38B-1547-4377-894E-DB5C6447A330 Thu, 15 Sep 2016 17:28:09 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Massive drive failures after a datacenter gas attack. A critical MySQL vulnerability you should know about & is Cisco responsible for the death of an MMO? Plus great questions, our answers & much more! 1:17:52 false Massive drive failures after a datacenter gas attack. A critical MySQL vulnerability you should know about & is Cisco responsible for the death of an MMO?

Plus great questions, our answers & much more!

]]>
Massive drive failures after a datacenter gas attack. A critical MySQL vulnerability you should know about & is Cisco responsible for the death of an MMO?

Plus great questions, our answers & much more!

]]>
Massive drive failures after a datacenter gas attack. A critical MySQL vulnerability you should know about & is Cisco responsible for the death of an MMO?

Plus great questions, our answers & much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+gZ7RBye2 ]]>
Episode 283: I Can't Believe It's Not Ethernet | TechSNAP 283 https://techsnap.systems/283 A80CEF4B-1B87-4630-9618-9F34AA0BBF98 Thu, 08 Sep 2016 21:00:07 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting How a modified USB ethernet adapter can steal credentials, a new compression algorithm from Facebook that might be legit & the terrible terrible security of a consumer NAS. Plus great questions, our answers, a fun roundup & much, much more! 1:23:38 false How a modified USB ethernet adapter can steal credentials, a new compression algorithm from Facebook that might be legit & the terrible terrible security of a consumer NAS.

Plus great questions, our answers, a fun roundup & much, much more!

]]>
How a modified USB ethernet adapter can steal credentials, a new compression algorithm from Facebook that might be legit & the terrible terrible security of a consumer NAS.

Plus great questions, our answers, a fun roundup & much, much more!

]]>
How a modified USB ethernet adapter can steal credentials, a new compression algorithm from Facebook that might be legit & the terrible terrible security of a consumer NAS.

Plus great questions, our answers, a fun roundup & much, much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+cOl-Qg1j ]]>
Episode 282: The Shadow Knows | TechSNAP 282 https://techsnap.systems/282 981B5A0F-5B39-409C-8A61-959BB0CF6F24 Thu, 01 Sep 2016 19:21:35 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting The ShadowBrokers release a batch of the NSA’s tools & we dive in. A Google login issue allows for credential theft & researchers map the Netflix content delivery network! Plus great feedback, follow up, a rockin' roundup & much, much more! 1:33:53 false The ShadowBrokers release a batch of the NSA’s tools & we dive in. A Google login issue allows for credential theft & researchers map the Netflix content delivery network!

Plus great feedback, follow up, a rockin' roundup & much, much more!

]]>
The ShadowBrokers release a batch of the NSA’s tools & we dive in. A Google login issue allows for credential theft & researchers map the Netflix content delivery network!

Plus great feedback, follow up, a rockin' roundup & much, much more!

]]>
The ShadowBrokers release a batch of the NSA’s tools & we dive in. A Google login issue allows for credential theft & researchers map the Netflix content delivery network!

Plus great feedback, follow up, a rockin' roundup & much, much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+NXLgLoPB ]]>
Episode 281: iPhishing Expedition | TechSNAP 281 https://techsnap.systems/281 E9A33A05-417E-4BB8-8573-653AA552C854 Thu, 25 Aug 2016 19:49:00 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting iOS targeted malware in the wild, the simple approach to hacking electronic safes & how digital forensics prove a journalist was framed. Plus your great questions, a packed round up & much more! 1:22:01 false iOS targeted malware in the wild, the simple approach to hacking electronic safes & how digital forensics prove a journalist was framed.

Plus your great questions, a packed round up & much more!

]]>
iOS targeted malware in the wild, the simple approach to hacking electronic safes & how digital forensics prove a journalist was framed.

Plus your great questions, a packed round up & much more!

]]>
iOS targeted malware in the wild, the simple approach to hacking electronic safes & how digital forensics prove a journalist was framed.

Plus your great questions, a packed round up & much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+Pd-tVyLF ]]>
Episode 280: Microsoft’s Golden Ticket | TechSNAP 280 https://techsnap.systems/280 6671BE33-52E3-4372-B532-074CAD41BBC7 Thu, 18 Aug 2016 09:03:59 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Microsoft leaks their golden key, allowing attackers to unlock secure boot systems, a security breach at Oracle exposes hundreds of companies & Linux has an embarrassing networking stack bug. Plus your questions, our answers & a packed round up! 1:38:47 false Microsoft leaks their golden key, allowing attackers to unlock secure boot systems, a security breach at Oracle exposes hundreds of companies & Linux has an embarrassing networking stack bug.

Plus your questions, our answers & a packed round up!

]]>
Microsoft leaks their golden key, allowing attackers to unlock secure boot systems, a security breach at Oracle exposes hundreds of companies & Linux has an embarrassing networking stack bug.

Plus your questions, our answers & a packed round up!

]]>
Microsoft leaks their golden key, allowing attackers to unlock secure boot systems, a security breach at Oracle exposes hundreds of companies & Linux has an embarrassing networking stack bug.

Plus your questions, our answers & a packed round up!

]]>
https://fireside.fm/player/v2/sHzmXDIv+GFFoOKks ]]>
Episode 279: The Internet is Dying | TechSNAP 279 https://techsnap.systems/279 F2B9AEB9-52B6-4C8D-AFAD-6A08771D4C9A Thu, 11 Aug 2016 07:08:50 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Why the Internet needs it’s own version of cancer researchers, bypassing chip and pin protections & the 2016 Pwnie Awards from Blackhat! Plus your questions, our answers & much, much more! 1:08:51 false Why the Internet needs it’s own version of cancer researchers, bypassing chip and pin protections & the 2016 Pwnie Awards from Blackhat!

Plus your questions, our answers & much, much more!

]]>
Why the Internet needs it’s own version of cancer researchers, bypassing chip and pin protections & the 2016 Pwnie Awards from Blackhat!

Plus your questions, our answers & much, much more!

]]>
Why the Internet needs it’s own version of cancer researchers, bypassing chip and pin protections & the 2016 Pwnie Awards from Blackhat!

Plus your questions, our answers & much, much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+KGl2-Ujs ]]>
Episode 278: Dangerous Dangling Quotes | TechSNAP 278 https://techsnap.systems/278 2EF103D3-0DDC-4F7D-8BFC-32BFAF344BE7 Thu, 04 Aug 2016 18:48:29 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting How to get an SSL certificate for other people's domains, how to decrypt HTTPS traffic with some javascript & the latest storage reliability report. Plus great questions & a rocking round up! 1:32:09 false How to get an SSL certificate for other people's domains, how to decrypt HTTPS traffic with some javascript & the latest storage reliability report.

Plus great questions & a rocking round up!

]]>
How to get an SSL certificate for other people's domains, how to decrypt HTTPS traffic with some javascript & the latest storage reliability report.

Plus great questions & a rocking round up!

]]>
How to get an SSL certificate for other people's domains, how to decrypt HTTPS traffic with some javascript & the latest storage reliability report.

Plus great questions & a rocking round up!

]]>
https://fireside.fm/player/v2/sHzmXDIv+JKUFyHzU ]]>
Episode 277: Internet Power Struggle | TechSNAP 277 https://techsnap.systems/277 1515255F-DBC6-42A1-97AB-B6334F511231 Thu, 28 Jul 2016 22:55:15 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting We’re in an epic battle for power in cyberspace & Bruce Schneier breaks it down. PHP gets broken, PornHub gets hacked & the disgruntled employee who wiped the router configs on his way out the door. Plus great emails, a packed round up & more! 1:29:27 false We’re in the middle of an epic battle for power in cyberspace & Bruce Schneier breaks it down. PHP gets broken, PornHub gets hacked & the disgruntled employee who wiped the router configs on his way out the door.

Plus great emails, a packed round up & more!

]]>
We’re in the middle of an epic battle for power in cyberspace & Bruce Schneier breaks it down. PHP gets broken, PornHub gets hacked & the disgruntled employee who wiped the router configs on his way out the door.

Plus great emails, a packed round up & more!

]]>
We’re in the middle of an epic battle for power in cyberspace & Bruce Schneier breaks it down. PHP gets broken, PornHub gets hacked & the disgruntled employee who wiped the router configs on his way out the door.

Plus great emails, a packed round up & more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+QfufUsYH ]]>
Episode 276: Bitmap Pox | TechSNAP 276 https://techsnap.systems/276 32E3D0F7-DEF0-4E86-9D5F-5DF6E23DE8B0 Thu, 21 Jul 2016 19:19:58 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting A new vulnerability in many websites, Oracle's Outside In Technology, Turned Inside-Out & the value of a hacked company. Plus your questions, our answers, a really great round up & much more! 1:19:16 false A new vulnerability in many websites, Oracle's Outside In Technology, Turned Inside-Out & the value of a hacked company.

Plus your questions, our answers, a really great round up & much more!

]]>
A new vulnerability in many websites, Oracle's Outside In Technology, Turned Inside-Out & the value of a hacked company.

Plus your questions, our answers, a really great round up & much more!

]]>
A new vulnerability in many websites, Oracle's Outside In Technology, Turned Inside-Out & the value of a hacked company.

Plus your questions, our answers, a really great round up & much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+8EBY_J_5 ]]>
Episode 275: Ending Ransomware | TechSNAP 275 https://techsnap.systems/275 7F664503-9ED3-499A-8F47-20DE45676ED9 Thu, 14 Jul 2016 18:41:22 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting A potential solution to Ransomware, the 15 year bug that cost CitiGroup $7 Million dollars, Dropbox’s new middle out compression & another flaw that affects all versions of Windows. Plus your questions, our answers, a packed roundup & more! 1:25:41 false A potential solution to Ransomware, the 15 year bug that cost CitiGroup $7 Million dollars, Dropbox’s new middle out compression & another flaw that affects all versions of Windows.

Plus your questions, our answers, a packed roundup & more!

]]>
A potential solution to Ransomware, the 15 year bug that cost CitiGroup $7 Million dollars, Dropbox’s new middle out compression & another flaw that affects all versions of Windows.

Plus your questions, our answers, a packed roundup & more!

]]>
A potential solution to Ransomware, the 15 year bug that cost CitiGroup $7 Million dollars, Dropbox’s new middle out compression & another flaw that affects all versions of Windows.

Plus your questions, our answers, a packed roundup & more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+soaA0LO_ ]]>
Episode 274: Windows Exploit Edition | TechSNAP 274 https://techsnap.systems/274 99DB924C-A14B-48BF-887B-2FF3B2864735 Thu, 07 Jul 2016 20:30:19 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting On this weeks episode we cover a UEFI firmware bug that is affecting computers including ThinkPads, tell you how your windows box can be totally pwned even if it's encrypted & talk about the shortcomings of the MD5 checksum. Plus the feedback & more! 1:28:14 false On this weeks episode we cover a UEFI firmware bug that is affecting computers including ThinkPads, tell you how your windows box can be totally pwned even if it's fully encrypted & talk about the shortcomings of the MD5 checksum. Plus the feedback, the roundup & more!

]]>
On this weeks episode we cover a UEFI firmware bug that is affecting computers including ThinkPads, tell you how your windows box can be totally pwned even if it's fully encrypted & talk about the shortcomings of the MD5 checksum. Plus the feedback, the roundup & more!

]]>
On this weeks episode we cover a UEFI firmware bug that is affecting computers including ThinkPads, tell you how your windows box can be totally pwned even if it's fully encrypted & talk about the shortcomings of the MD5 checksum. Plus the feedback, the roundup & more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+PMPcu0Ti ]]>
Episode 273: Make Ads GIF Again | TechSNAP 273 https://techsnap.systems/273 A96CC29F-51EC-446F-9782-415E40F5C0E2 Thu, 30 Jun 2016 18:49:48 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Project Zero lays into Symantec's enterprise products, the botnet you’ll never find & the poor security of HTML5 video ads. Plus your questions, our answers & much more! 1:37:38 false Project Zero lays into Symantec's enterprise products, the botnet you’ll never find & the poor security of HTML5 video ads.

Plus your questions, our answers & much more!

]]>
Project Zero lays into Symantec's enterprise products, the botnet you’ll never find & the poor security of HTML5 video ads.

Plus your questions, our answers & much more!

]]>
Project Zero lays into Symantec's enterprise products, the botnet you’ll never find & the poor security of HTML5 video ads.

Plus your questions, our answers & much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+7q7RZa_3 ]]>
Episode 272: Game of File Systems | TechSNAP 272 https://techsnap.systems/272 83050093-9410-487D-B6F9-D980D028C6E8 Thu, 23 Jun 2016 19:58:09 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting What’s got Windows admins in a Panic? Total chaos my friends, we’ll tell you why. Extensive coverage of Apple’s new filesystem, Ransomware that might just impress you… Your great questions, our answers, a packed round up & much, much more! 2:07:30 false What’s got Windows admins in a Panic? Total chaos my friends, we’ll tell you why. Extensive coverage of Apple’s new filesystem, Ransomware that might just impress you…

Your great questions, our answers, a packed round up & much, much more!

]]>
What’s got Windows admins in a Panic? Total chaos my friends, we’ll tell you why. Extensive coverage of Apple’s new filesystem, Ransomware that might just impress you…

Your great questions, our answers, a packed round up & much, much more!

]]>
What’s got Windows admins in a Panic? Total chaos my friends, we’ll tell you why. Extensive coverage of Apple’s new filesystem, Ransomware that might just impress you…

Your great questions, our answers, a packed round up & much, much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+ti35SuYQ ]]>
Episode 271: Apple Pretend Filesystem | TechSNAP 271 https://techsnap.systems/271 617BF5EE-4D50-4FB3-9A41-644F49D3B307 Thu, 16 Jun 2016 19:51:16 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Why didn’t Apple choose ZFS for its new filesystem? We journey through the long history of ZFS at Apple. Plus how the BadTunnel bug can hijack traffic from all versions of Windows & should we worry about Intel’s management tech & much more! 1:58:25 false Why didn’t Apple choose ZFS for its new filesystem? We journey through the long history of ZFS at Apple. Plus how the BadTunnel bug can hijack traffic from all versions of Windows & should we worry about Intel’s management tech?

Plus great questions, a huge round up & much more!

]]>
Why didn’t Apple choose ZFS for its new filesystem? We journey through the long history of ZFS at Apple. Plus how the BadTunnel bug can hijack traffic from all versions of Windows & should we worry about Intel’s management tech?

Plus great questions, a huge round up & much more!

]]>
Why didn’t Apple choose ZFS for its new filesystem? We journey through the long history of ZFS at Apple. Plus how the BadTunnel bug can hijack traffic from all versions of Windows & should we worry about Intel’s management tech?

Plus great questions, a huge round up & much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+qUEGavcX ]]>
Episode 270: Signature Bloatware Updates | TechSNAP 270 https://techsnap.systems/270 3790A480-1C1F-459D-9EA7-CDCC79790AA8 Thu, 09 Jun 2016 11:18:02 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting The bloatware shipping on those new computers is way, way worse than you probably thought, Internet exposed printers & the thrilling story of reverse engineering an ATM skimmer. Yes that’s really a thing. Plus great questions, our answers & more! 1:15:57 false The bloatware shipping on those new computers is way, way worse than you probably thought, Internet exposed printers & the thrilling story of reverse engineering an ATM skimmer. Yes that’s really a thing.

Plus great questions, our answers & more!

]]>
The bloatware shipping on those new computers is way, way worse than you probably thought, Internet exposed printers & the thrilling story of reverse engineering an ATM skimmer. Yes that’s really a thing.

Plus great questions, our answers & more!

]]>
The bloatware shipping on those new computers is way, way worse than you probably thought, Internet exposed printers & the thrilling story of reverse engineering an ATM skimmer. Yes that’s really a thing.

Plus great questions, our answers & more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+Te4fVi4- ]]>
Episode 269: 10,000 Cables Under the Sea | TechSNAP 269 https://techsnap.systems/269 73E04878-85C4-4346-A675-A90A29838B55 Thu, 02 Jun 2016 17:24:00 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Windows exploits for sale at a great price, how the Internet works, yes, seriously & it's awesome! Plus we solve some of your problems, a great roundup & more! 1:41:27 false Windows exploits for sale at a great price, how the Internet works, yes, seriously & it's awesome!

Plus we solve some of your problems, a great roundup & more!

]]>
Windows exploits for sale at a great price, how the Internet works, yes, seriously & it's awesome!

Plus we solve some of your problems, a great roundup & more!

]]>
Windows exploits for sale at a great price, how the Internet works, yes, seriously & it's awesome!

Plus we solve some of your problems, a great roundup & more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+AUheEnDO ]]>
Episode 268: PIS Poor DNS | TechSNAP 268 https://techsnap.systems/268 A0D6D0E6-D044-4B91-A73C-4ECCD11D7BB8 Thu, 26 May 2016 18:38:08 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Is the “Dark Cloud” hype, or a real technology? Using DNS tunneling for remote command and control & the big problem with 1-Day exploits. Plus your great question, our answers, a breaking news roundup & more! 1:29:44 false Is the “Dark Cloud” hype, or a real technology? Using DNS tunneling for remote command and control & the big problem with 1-Day exploits.

Plus your great question, our answers, a breaking news roundup & more!

]]>
Is the “Dark Cloud” hype, or a real technology? Using DNS tunneling for remote command and control & the big problem with 1-Day exploits.

Plus your great question, our answers, a breaking news roundup & more!

]]>
Is the “Dark Cloud” hype, or a real technology? Using DNS tunneling for remote command and control & the big problem with 1-Day exploits.

Plus your great question, our answers, a breaking news roundup & more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+94IxFfSe ]]>
Episode 267: My Kingdom for a VLAN | TechSNAP 267 https://techsnap.systems/267 F63253DD-6474-4C81-9CBE-EB2BDD719375 Thu, 19 May 2016 18:39:53 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting A typo stops a billion dollar bank hack, a vulnerability in 7zip that might surprise you & the best solutions for secure remote network access. Your great questions, our answers, a packed round up & more! 1:23:46 false A typo stops a billion dollar bank hack, a vulnerability in 7zip that might surprise you & the best solutions for secure remote network access.

Your great questions, our answers, a packed round up & more!

]]>
A typo stops a billion dollar bank hack, a vulnerability in 7zip that might surprise you & the best solutions for secure remote network access.

Your great questions, our answers, a packed round up & more!

]]>
A typo stops a billion dollar bank hack, a vulnerability in 7zip that might surprise you & the best solutions for secure remote network access.

Your great questions, our answers, a packed round up & more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+A5C0ap7g ]]>
Episode 266: Curl Sleeper Agent | TechSNAP 266 https://techsnap.systems/266 37628685-AD03-4409-915D-7FAD714FE782 Thu, 12 May 2016 20:40:46 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Zero-day exploits striking over 100 systems, if you think copying links to bash scripts from the internet is okay, maybe you shouldn't be root & the day Google automated itself off the internet. Plus your questions, our answers, a huge round up & more! 1:40:24 false Zero-day exploits striking over 100 systems, if you think copying links to bash scripts from the internet is okay, maybe you shouldn't be root & the day Google automated itself off the internet.

Plus your questions, our answers, a huge round up & more!

]]>
Zero-day exploits striking over 100 systems, if you think copying links to bash scripts from the internet is okay, maybe you shouldn't be root & the day Google automated itself off the internet.

Plus your questions, our answers, a huge round up & more!

]]>
Zero-day exploits striking over 100 systems, if you think copying links to bash scripts from the internet is okay, maybe you shouldn't be root & the day Google automated itself off the internet.

Plus your questions, our answers, a huge round up & more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+K4gdUXy9 ]]>
Episode 265: Insecure Socket Layer | TechSNAP 265 https://techsnap.systems/265 96932968-2804-4AD4-96C6-C4B0EAC596BD Thu, 05 May 2016 21:37:50 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting A critical flaw in that bit of software tucked far far away that you never think about… We explain why ImageTragick is a pain. More OpenSSL flaws & fraudsters stealing tax data from the motherload. Plus your questions, our answers, the roundup & more! 1:25:46 false A critical flaw in that bit of software tucked far far away that you never think about… Until now, we explain why ImageTragick is a pain. More OpenSSL flaws & fraudsters stealing tax data from the motherload.

Plus great questions, our answers, a packed Round up & more!

]]>
A critical flaw in that bit of software tucked far far away that you never think about… Until now, we explain why ImageTragick is a pain. More OpenSSL flaws & fraudsters stealing tax data from the motherload.

Plus great questions, our answers, a packed Round up & more!

]]>
A critical flaw in that bit of software tucked far far away that you never think about… Until now, we explain why ImageTragick is a pain. More OpenSSL flaws & fraudsters stealing tax data from the motherload.

Plus great questions, our answers, a packed Round up & more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+-X4sK_0E ]]>
Episode 264: On Target | TechSNAP 264 https://techsnap.systems/264 EBDB5A6E-41E3-4DA4-84CC-37D4CCF8336E Thu, 28 Apr 2016 06:58:28 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting This week, Chris & allan are both out of town at different shenanigans, but they recorded a sneaky episode for you in which they recap the Target breach, from when the news broke to the lessons learned and everything in between! 1:26:15 false This week, Chris & allan are both out of town at different shenanigans, but they recorded a sneaky episode for you in which they recap the Target breach, from when the news broke to the lessons learned and everything in between!

]]>
This week, Chris & allan are both out of town at different shenanigans, but they recorded a sneaky episode for you in which they recap the Target breach, from when the news broke to the lessons learned and everything in between!

]]>
This week, Chris & allan are both out of town at different shenanigans, but they recorded a sneaky episode for you in which they recap the Target breach, from when the news broke to the lessons learned and everything in between!

]]>
https://fireside.fm/player/v2/sHzmXDIv+EcycYYWN ]]>
Episode 263: One Key to Rule Them All | TechSNAP 263 https://techsnap.systems/263 0638D7DB-515E-449C-AF1B-B584DC5595F7 Thu, 21 Apr 2016 11:44:47 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting This week, the FBI says APT6 has pawned the government for the last 5 years, Unaoil: a company that's bribing the world & Researchers find a flaw in the visa database. All that plus a packed feedback, roundup & more! 1:10:36 false This week, the FBI says APT6 has pawned the government for the last 5 years, Unaoil: a company that's bribing the world & Researchers find a flaw in the visa database.

All that plus a packed feedback, roundup & more!

]]>
This week, the FBI says APT6 has pawned the government for the last 5 years, Unaoil: a company that's bribing the world & Researchers find a flaw in the visa database.

All that plus a packed feedback, roundup & more!

]]>
This week, the FBI says APT6 has pawned the government for the last 5 years, Unaoil: a company that's bribing the world & Researchers find a flaw in the visa database.

All that plus a packed feedback, roundup & more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+dGc9XOVB ]]>
Episode 262: rm -rf $ALLTHETHINGS/ | TechSNAP 262 https://techsnap.systems/262 AC85D9F6-AFB1-40D1-BABB-F98206303C36 Thu, 14 Apr 2016 19:38:34 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Find out why everyone's disappointed in Badlock, the bad security that could be connected to the Panama Papers leak & a simple delete command that took out an entire hosting provider. Plus your batch of networking questions, a packed round up & more! 1:36:36 false Find out why everyone's just a little disappointed in Badlock, the bad security that could be connected to the Panama Papers leak & the story of a simple delete command that took out an entire hosting provider.

Plus your batch of networking questions, our answers & a packed round up!

]]>
Find out why everyone's just a little disappointed in Badlock, the bad security that could be connected to the Panama Papers leak & the story of a simple delete command that took out an entire hosting provider.

Plus your batch of networking questions, our answers & a packed round up!

]]>
Find out why everyone's just a little disappointed in Badlock, the bad security that could be connected to the Panama Papers leak & the story of a simple delete command that took out an entire hosting provider.

Plus your batch of networking questions, our answers & a packed round up!

]]>
https://fireside.fm/player/v2/sHzmXDIv+VtCLct7Z ]]>
Episode 261: Holding Hospitals Hostage | TechSNAP 261 https://techsnap.systems/261 03421C0F-687D-4656-8E8C-0705E6374D57 Thu, 07 Apr 2016 09:51:27 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Find out about another hospital that accidentally took advantage of free encryption, researchers turn up a DDoS on the root DNS servers & the password test you never want to take. Plus your batch of networking questions, our answers & a packed round up! 1:13:50 false Find out about another hospital that accidentally took advantage of free encryption, researchers turn up a DDoS on the root DNS servers & the password test you never want to take.

Plus your batch of networking questions, our answers & a packed round up!

]]>
Find out about another hospital that accidentally took advantage of free encryption, researchers turn up a DDoS on the root DNS servers & the password test you never want to take.

Plus your batch of networking questions, our answers & a packed round up!

]]>
Find out about another hospital that accidentally took advantage of free encryption, researchers turn up a DDoS on the root DNS servers & the password test you never want to take.

Plus your batch of networking questions, our answers & a packed round up!

]]>
https://fireside.fm/player/v2/sHzmXDIv+wIx-tU_5 ]]>
Episode 260: Pay to Boot | TechSNAP 260 https://techsnap.systems/260 8DA3642C-1DEC-4279-873D-2B2F3BA8273F Thu, 31 Mar 2016 16:03:26 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting New Ransomware locks your bootloader & makes you pay to boot. Malware with built in DRM? We’ll share the story of this clever hack. Plus some great questions, our answers, a packed round up & more! 1:13:12 false New Ransomware locks your bootloader & makes you pay to boot. Malware with built in DRM? We’ll share the story of this clever hack.

Plus some great questions, our answers, a packed round up & more!

]]>
New Ransomware locks your bootloader & makes you pay to boot. Malware with built in DRM? We’ll share the story of this clever hack.

Plus some great questions, our answers, a packed round up & more!

]]>
New Ransomware locks your bootloader & makes you pay to boot. Malware with built in DRM? We’ll share the story of this clever hack.

Plus some great questions, our answers, a packed round up & more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+w_2dWSje ]]>
Episode 259: Can You Hack Me Now? | TechSNAP 259 https://techsnap.systems/259 2F7CB58D-906F-4E8C-872C-7A9C53FF64F6 Thu, 24 Mar 2016 18:54:15 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Verizon Enterprise gets breached & the irony is strong with this one, details on the NPM fiasco & why the SAMSAM is holding up the doctor. Plus some great questions, a packed round up & much, much more! 1:30:41 false Verizon Enterprise gets breached & the irony is strong with this one, details on the NPM fiasco & why the SAMSAM is holding up the doctor.

Plus some great questions, a packed round up & much, much more!

]]>
Verizon Enterprise gets breached & the irony is strong with this one, details on the NPM fiasco & why the SAMSAM is holding up the doctor.

Plus some great questions, a packed round up & much, much more!

]]>
Verizon Enterprise gets breached & the irony is strong with this one, details on the NPM fiasco & why the SAMSAM is holding up the doctor.

Plus some great questions, a packed round up & much, much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+XPcp1_Jq ]]>
Episode 258: Metaphorically Exploited | TechSNAP 258 https://techsnap.systems/258 242A017F-88D2-441B-B766-98C31E6DF940 Thu, 17 Mar 2016 18:11:45 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting The theoretical Android flaw becomes reality, a simple phishing scam hits some major companies & why your PIN has already been leaked. Plus great questions, our answers, a rocking round up & much, much more! 1:13:00 false The theoretical Android flaw becomes reality, a simple phishing scam hits some major companies & why your PIN has already been leaked.

Plus great questions, our answers, a rocking round up & much, much more!

]]>
The theoretical Android flaw becomes reality, a simple phishing scam hits some major companies & why your PIN has already been leaked.

Plus great questions, our answers, a rocking round up & much, much more!

]]>
The theoretical Android flaw becomes reality, a simple phishing scam hits some major companies & why your PIN has already been leaked.

Plus great questions, our answers, a rocking round up & much, much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+HacZFdmU ]]>
Episode 257: Fixing the Barn Door | TechSNAP 257 https://techsnap.systems/257 34553705-77CE-4E4D-B335-C78B5D2C301F Thu, 10 Mar 2016 10:04:14 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting We’ll tell you about the real world pirates that hacked a shipping company, the open source libraries from Mars Rover found being used in malware & Microsoft’s solution for that after-hack hangover. Plus great questions, a packed round up & much more! 1:20:48 false We’ll tell you about the real world pirates that hacked a shipping company, the open source libraries from Mars Rover found being used in malware & Microsoft’s solution for that after-hack hangover.

Plus great questions, a packed round up & much more!

]]>
We’ll tell you about the real world pirates that hacked a shipping company, the open source libraries from Mars Rover found being used in malware & Microsoft’s solution for that after-hack hangover.

Plus great questions, a packed round up & much more!

]]>
We’ll tell you about the real world pirates that hacked a shipping company, the open source libraries from Mars Rover found being used in malware & Microsoft’s solution for that after-hack hangover.

Plus great questions, a packed round up & much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+BRo_gd_y ]]>
Episode 256: Open Server Sadness Layer | TechSNAP 256 https://techsnap.systems/256 4D9C42DA-4C75-4595-9DF6-FBF9272371C0 Thu, 03 Mar 2016 17:22:59 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting OpenSSL issues a major security advisory, we break down the important details, then go in depth on the real world impact of these flaws. Plus some great storage and networking question, a packed round up & much, much more! 1:50:11 false OpenSSL issues a major security advisory, we break down the important details, then go in depth on the real world impact of these flaws.

Plus some great storage and networking question, a packed round up & much, much more!

]]>
OpenSSL issues a major security advisory, we break down the important details, then go in depth on the real world impact of these flaws.

Plus some great storage and networking question, a packed round up & much, much more!

]]>
OpenSSL issues a major security advisory, we break down the important details, then go in depth on the real world impact of these flaws.

Plus some great storage and networking question, a packed round up & much, much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+8YDOAz2r ]]>
Episode 255: Dip the Chip | TechSNAP 255 https://techsnap.systems/255 07CB06D7-4A48-4B84-8C8E-FFD91E007F59 Thu, 25 Feb 2016 17:50:44 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting What’s taking the states so long to catch up to the rest of the civilized world and dip the chip? Turns out it's really complicated, we explain. Plus keeping a Hospital secure is much more than following HIPAA, and an analysis of Keybase malware. 1:38:29 false What’s taking the states so long to catch up to the rest of the civilized world and dip the chip? Turns out it's really complicated, we explain. Plus keeping a Hospital secure is much more than following HIPAA, and an analysis of Keybase malware.

Plus great questions, our answers, and much much more!

]]>
What’s taking the states so long to catch up to the rest of the civilized world and dip the chip? Turns out it's really complicated, we explain. Plus keeping a Hospital secure is much more than following HIPAA, and an analysis of Keybase malware.

Plus great questions, our answers, and much much more!

]]>
What’s taking the states so long to catch up to the rest of the civilized world and dip the chip? Turns out it's really complicated, we explain. Plus keeping a Hospital secure is much more than following HIPAA, and an analysis of Keybase malware.

Plus great questions, our answers, and much much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+y8UsU6ca ]]>
Episode 254: Weaponized Comic Sans | TechSNAP 254 https://techsnap.systems/254 2E261630-4906-47E5-BD8B-F8BA29ED527C Thu, 18 Feb 2016 19:02:46 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting A common vulnerability is impacting Firefox, LibreOffice, and others, the 7 problems with ATM security, and the Enterprise grade protection defeated with a batch script. Plus some great questions, our answers, a rockin roundup, and much much more! 1:37:15 false A common vulnerability is impacting Firefox, LibreOffice, and others, the 7 problems with ATM security, and the Enterprise grade protection defeated with a batch script.

Plus some great questions, our answers, a rockin roundup, and much much more!

]]>
A common vulnerability is impacting Firefox, LibreOffice, and others, the 7 problems with ATM security, and the Enterprise grade protection defeated with a batch script.

Plus some great questions, our answers, a rockin roundup, and much much more!

]]>
A common vulnerability is impacting Firefox, LibreOffice, and others, the 7 problems with ATM security, and the Enterprise grade protection defeated with a batch script.

Plus some great questions, our answers, a rockin roundup, and much much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+hAwFbIEv ]]>
Episode 253: Cisco's Perfect 10 | TechSNAP 253 https://techsnap.systems/253 7758EAAC-E8E4-449E-8361-3ACCC4FBC90F Thu, 11 Feb 2016 17:56:40 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Cisco has a wormable vulnerability in its Firewall appliances, crimeware that allows unlimited ATM withdrawals & the big problem with the Java installer. Plus great questions, a rocking round up & much, much more! 1:06:45 false Cisco has a wormable vulnerability in its Firewall appliances, crimeware that allows unlimited ATM withdrawals & the big problem with the Java installer.

Plus great questions, a rocking round up & much, much more!

]]>
Cisco has a wormable vulnerability in its Firewall appliances, crimeware that allows unlimited ATM withdrawals & the big problem with the Java installer.

Plus great questions, a rocking round up & much, much more!

]]>
Cisco has a wormable vulnerability in its Firewall appliances, crimeware that allows unlimited ATM withdrawals & the big problem with the Java installer.

Plus great questions, a rocking round up & much, much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+lgJ9In78 ]]>
Episode 252: Hot Norse Potato | TechSNAP 252 https://techsnap.systems/252 D0D47725-5DA5-493A-A860-136E779FB14B Thu, 04 Feb 2016 18:41:29 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting A new openSSL exploit, cyber security firm Norse implodes & the Windows Hot Potato flaw that’s been around for over a decade. Plus great questions, our answers, a rockin round up & much, much more! 1:44:48 false A new openSSL exploit, cyber security firm Norse implodes & the Windows Hot Potato flaw that’s been around for over a decade.

Plus great questions, our answers, a rockin round up & much, much more!

]]>
A new openSSL exploit, cyber security firm Norse implodes & the Windows Hot Potato flaw that’s been around for over a decade.

Plus great questions, our answers, a rockin round up & much, much more!

]]>
A new openSSL exploit, cyber security firm Norse implodes & the Windows Hot Potato flaw that’s been around for over a decade.

Plus great questions, our answers, a rockin round up & much, much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+5JNTL7vb ]]>
Episode 251: A Look Back On Feedback | TechSNAP 251 https://techsnap.systems/251 6F986195-83BB-4135-9F4A-AE4814155B8D Thu, 28 Jan 2016 08:10:18 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Since Allan is off being fancy at FOSDEM, we decided that now would be a good time to celebrate the audience & feature some of the best feedback we've had over the years! 1:20:32 false Since Allan is off being fancy at FOSDEM, we decided that now would be a good time to celebrate the audience & feature some of the best feedback we've had over the years!

]]>
Since Allan is off being fancy at FOSDEM, we decided that now would be a good time to celebrate the audience & feature some of the best feedback we've had over the years!

]]>
Since Allan is off being fancy at FOSDEM, we decided that now would be a good time to celebrate the audience & feature some of the best feedback we've had over the years!

]]>
https://fireside.fm/player/v2/sHzmXDIv+KL4B5WQy ]]>
Episode 250: Lights out Management | TechSNAP 250 https://techsnap.systems/250 ED2E54C4-4762-4C5B-8A34-0D52D895DF46 Thu, 21 Jan 2016 10:10:51 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting The bizarre saga of Juniper maybe finally be coming to a conclusion, details about SLOTH, the latest SSL vulnerability that also affects IPSec and SSH & the attack on the Ukrainian power grid made possible by malware & much more! 1:13:31 false The bizarre saga of Juniper maybe finally be coming to a conclusion, details about SLOTH, the latest SSL vulnerability that also affects IPSec and SSH & the attack on the Ukrainian power grid made possible by malware.

Plus your questions with a special theme, a rockin roundup & much more!

]]>
The bizarre saga of Juniper maybe finally be coming to a conclusion, details about SLOTH, the latest SSL vulnerability that also affects IPSec and SSH & the attack on the Ukrainian power grid made possible by malware.

Plus your questions with a special theme, a rockin roundup & much more!

]]>
The bizarre saga of Juniper maybe finally be coming to a conclusion, details about SLOTH, the latest SSL vulnerability that also affects IPSec and SSH & the attack on the Ukrainian power grid made possible by malware.

Plus your questions with a special theme, a rockin roundup & much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+CFlEAron ]]>
Episode 249: Internet of Threats | TechSNAP 249 https://techsnap.systems/249 C60A273A-A92E-4359-A0CB-6CE5BF7C914D Thu, 14 Jan 2016 17:03:30 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting A Critical OpenSSH flaw can expose your private keys, a new WiFi spec for IoT devices, that has all the classic issues & Intel’s SkyLake bug. Plus your feedback, our answers, a rockin’ round up & so much more! 1:30:58 false A Critical OpenSSH flaw can expose your private keys, a new WiFi spec for IoT devices, that has all the classic issues & Intel’s SkyLake bug.

Plus your feedback, our answers, a rockin’ round up & so much more!

]]>
A Critical OpenSSH flaw can expose your private keys, a new WiFi spec for IoT devices, that has all the classic issues & Intel’s SkyLake bug.

Plus your feedback, our answers, a rockin’ round up & so much more!

]]>
A Critical OpenSSH flaw can expose your private keys, a new WiFi spec for IoT devices, that has all the classic issues & Intel’s SkyLake bug.

Plus your feedback, our answers, a rockin’ round up & so much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+FF8HJuin ]]>
Episode 248: Virtual Private Surveillance | TechSNAP 248 https://techsnap.systems/248 2741557E-BB94-4D1B-B064-44185D0FFD3F Thu, 07 Jan 2016 19:23:36 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting We break down the Bicycle attack against SSL, the story of Brian Krebs’s PayPal account getting backed & the scoop on the Juniper Saga. Plus some great questions, our answers, a news breaking round up & much more! 1:36:52 false We break down the Bicycle attack against SSL, the story of Brian Krebs’s PayPal account getting backed & the scoop on the Juniper Saga.

Plus some great questions, our answers, a news breaking round up & much more!

]]>
We break down the Bicycle attack against SSL, the story of Brian Krebs’s PayPal account getting backed & the scoop on the Juniper Saga.

Plus some great questions, our answers, a news breaking round up & much more!

]]>
We break down the Bicycle attack against SSL, the story of Brian Krebs’s PayPal account getting backed & the scoop on the Juniper Saga.

Plus some great questions, our answers, a news breaking round up & much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+svKcQQRL ]]>
Episode 247: Snappy New Year! | TechSNAP 247 https://techsnap.systems/247 A79A834F-8C9D-48E2-AB06-448686D45C3C Thu, 31 Dec 2015 08:13:45 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting We take a look back at some of the big stories of 2015, at least, as we see it. Plus the round up & more! 2:13:19 false We take a look back at some of the big stories of 2015, at least, as we see it.

Plus the round up & more!

]]>
We take a look back at some of the big stories of 2015, at least, as we see it.

Plus the round up & more!

]]>
We take a look back at some of the big stories of 2015, at least, as we see it.

Plus the round up & more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+BOnjxwl2 ]]>
Episode 246: Allan's Favorite Things | TechSNAP 246 https://techsnap.systems/246 DE0B8F21-D537-4F02-823A-5BD062EFB8CE Thu, 24 Dec 2015 09:44:37 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting It’s a collection of Allan’s favorite moments from TechSNAP past. Plus the week’s new stories in the roundup & much more! 2:09:12 false It’s a collection of Allan’s favorite moments from TechSNAP past. Plus the week’s new stories in the roundup & much more!

]]>
It’s a collection of Allan’s favorite moments from TechSNAP past. Plus the week’s new stories in the roundup & much more!

]]>
It’s a collection of Allan’s favorite moments from TechSNAP past. Plus the week’s new stories in the roundup & much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+1dRbL9GV ]]>
Episode 245: Insecurity Appliance | TechSNAP 245 https://techsnap.systems/245 E62AD877-751A-4C40-A2BC-500ABEB5483B Thu, 17 Dec 2015 19:49:21 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Meet BOOTTRASH the Malware that executes before your OS does, the hard questions you need to ask when buying a security appliance, Project Zero finds flaws in Fireeye hardware. Plus some great audience questions, a big round up & much, much more! 1:42:23 false Meet BOOTTRASH the Malware that executes before your OS does, the hard questions you need to ask when buying a security appliance, Project Zero finds flaws in Fireeye hardware.

Plus some great audience questions, a big round up & much, much more!

]]>
Meet BOOTTRASH the Malware that executes before your OS does, the hard questions you need to ask when buying a security appliance, Project Zero finds flaws in Fireeye hardware.

Plus some great audience questions, a big round up & much, much more!

]]>
Meet BOOTTRASH the Malware that executes before your OS does, the hard questions you need to ask when buying a security appliance, Project Zero finds flaws in Fireeye hardware.

Plus some great audience questions, a big round up & much, much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+VZIuOol0 ]]>
Episode 244: Finding Nakamoto | TechSNAP 244 https://techsnap.systems/244 75758C04-1396-473F-B390-9583356891C8 Thu, 10 Dec 2015 20:00:22 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Bitcoin’s creator has been found again, we’ll cover what the media thinks they’ve figured out & what we really know. Then, 'In Patches We Trust: Why Security Updates have to get better', a great batch of questions, a huge round up & much more! 1:55:57 false Bitcoin’s creator has been found again, we’ll cover what the media thinks they’ve figured out & what we really know.

Then, 'In Patches We Trust: Why Security Updates have to get better', a great batch of questions, a huge round up & much more!

]]>
Bitcoin’s creator has been found again, we’ll cover what the media thinks they’ve figured out & what we really know.

Then, 'In Patches We Trust: Why Security Updates have to get better', a great batch of questions, a huge round up & much more!

]]>
Bitcoin’s creator has been found again, we’ll cover what the media thinks they’ve figured out & what we really know.

Then, 'In Patches We Trust: Why Security Updates have to get better', a great batch of questions, a huge round up & much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+PjcSxzz- ]]>
Episode 243: SpyFi Barbie | TechSNAP 243 https://techsnap.systems/243 8D0ED3B6-C20B-428C-A8F3-DD6AEF209938 Thu, 03 Dec 2015 18:50:21 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting The US Government is offering free penetration tests, with a catch, we break down the VTech Breakin & the only sure way to protect your credit online. Plus great questions, a big round up with breaking news & much more! 1:35:56 false The US Government is offering free penetration tests, with a catch, we break down the VTech Breakin & the only sure way to protect your credit online.

Plus great questions, a big round up with breaking news & much more!

]]>
The US Government is offering free penetration tests, with a catch, we break down the VTech Breakin & the only sure way to protect your credit online.

Plus great questions, a big round up with breaking news & much more!

]]>
The US Government is offering free penetration tests, with a catch, we break down the VTech Breakin & the only sure way to protect your credit online.

Plus great questions, a big round up with breaking news & much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+nOVyUCRY ]]>
Episode 242: A Keyboard Walks into a Barcode | TechSNAP 242 https://techsnap.systems/242 9C3CCEE5-FB23-4CF7-BA69-4FE3A769DAD0 Thu, 26 Nov 2015 08:56:23 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting A research team finds various ways to attack LastPass, how to use a cocktail of current Android exploits to own a device & hacking a point of sale system using poisoned barcodes! Plus some great questions, our answers, a rockin roundup & much, much more! 1:20:00 false A research team finds various ways to attack LastPass, how to use a cocktail of current Android exploits to own a device & hacking a point of sale system using poisoned barcodes!

Plus some great questions, our answers, a rockin roundup & much, much more!

]]>
A research team finds various ways to attack LastPass, how to use a cocktail of current Android exploits to own a device & hacking a point of sale system using poisoned barcodes!

Plus some great questions, our answers, a rockin roundup & much, much more!

]]>
A research team finds various ways to attack LastPass, how to use a cocktail of current Android exploits to own a device & hacking a point of sale system using poisoned barcodes!

Plus some great questions, our answers, a rockin roundup & much, much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+saudQdsA ]]>
Episode 241: Double ROT-13 | TechSNAP 241 https://techsnap.systems/241 F523090D-1ED4-4AF8-A255-86A476B48AA0 Thu, 19 Nov 2015 17:05:59 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Encryption & privacy took quite a beating this week in the wake of the Paris attacks. We come to its defense. Your ISP heard you like backdoors, so they put a backdoor in your backdoor, the story of the social RAT & more! 1:26:54 false Encryption & privacy took quite a beating this week in the wake of the Paris attacks. We come to its defense. Your ISP heard you like backdoors, so they put a backdoor in your backdoor, the story of the social RAT & more!

]]>
Encryption & privacy took quite a beating this week in the wake of the Paris attacks. We come to its defense. Your ISP heard you like backdoors, so they put a backdoor in your backdoor, the story of the social RAT & more!

]]>
Encryption & privacy took quite a beating this week in the wake of the Paris attacks. We come to its defense. Your ISP heard you like backdoors, so they put a backdoor in your backdoor, the story of the social RAT & more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+ERRTjX_W ]]>
Episode 240: Zero-Days Of Our Lives | TechSNAP 240 https://techsnap.systems/240 70C2B0BD-072A-4B74-AC91-7FA2156D91B1 Thu, 12 Nov 2015 10:19:53 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting The first remote administration trojan that targets Android, Linux, Mac and Windows. Joomla and vBulletin have major flaws & tips for protecting your online privacy from some very motivated public figures. Plus great questions, a rockin' roundup & more! 1:25:23 false The first remote administration trojan that targets Android, Linux, Mac and Windows. Joomla and vBulletin have major flaws & tips for protecting your online privacy from some very motivated public figures.

Plus some great questions, a rockin' roundup & much, much more!

]]>
The first remote administration trojan that targets Android, Linux, Mac and Windows. Joomla and vBulletin have major flaws & tips for protecting your online privacy from some very motivated public figures.

Plus some great questions, a rockin' roundup & much, much more!

]]>
The first remote administration trojan that targets Android, Linux, Mac and Windows. Joomla and vBulletin have major flaws & tips for protecting your online privacy from some very motivated public figures.

Plus some great questions, a rockin' roundup & much, much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+Je59zz6Y ]]>
Episode 239: PLAID Falls Out of Fashion | TechSNAP 239 https://techsnap.systems/239 C9434831-1151-4E4D-9694-7F9A094AD735 Thu, 05 Nov 2015 07:51:13 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting CISA provides no solutions, just new excuses. The new Australian smartcard system is a total disaster & why Google’s URLs are so crazy. Plus some great questions, our answers, a rockin' round up & much, much more! 1:06:58 false CISA provides no solutions, just new excuses. The new Australian smartcard system is a total disaster & why Google’s URLs are so crazy.

Plus some great questions, our answers, a rockin' round up & much, much more!

]]>
CISA provides no solutions, just new excuses. The new Australian smartcard system is a total disaster & why Google’s URLs are so crazy.

Plus some great questions, our answers, a rockin' round up & much, much more!

]]>
CISA provides no solutions, just new excuses. The new Australian smartcard system is a total disaster & why Google’s URLs are so crazy.

Plus some great questions, our answers, a rockin' round up & much, much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+debtM9oG ]]>
Episode 238: Certifiable Authority | TechSNAP 238 https://techsnap.systems/238 B595569D-9167-44D0-BA58-97C5589D8D43 Thu, 29 Oct 2015 15:42:53 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting TalkTalk gets compromised, Hackers make cars safer & Google plays hardball with Symantec. Plus a great batch of your questions, a rocking round up & much, much more! 1:18:40 false TalkTalk gets compromised, Hackers make cars safer & Google plays hardball with Symantec.

Plus a great batch of your questions, a rocking round up & much, much more!

]]>
TalkTalk gets compromised, Hackers make cars safer & Google plays hardball with Symantec.

Plus a great batch of your questions, a rocking round up & much, much more!

]]>
TalkTalk gets compromised, Hackers make cars safer & Google plays hardball with Symantec.

Plus a great batch of your questions, a rocking round up & much, much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+tyAXvn5x ]]>
Episode 237: A Rip in NTP | TechSNAP 237 https://techsnap.systems/237 ACC8B0E9-AFC0-408B-A791-93299836F904 Thu, 22 Oct 2015 19:34:12 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting The OpenZFS summit just wrapped up and Allan shares the exciting new features coming to the file system, researchers warn about flaws in NTP & of course we've got some critical patches. Plus a great batch of questions, a rockin' round up & much more! 2:05:42 false The OpenZFS summit just wrapped up and Allan shares the exciting new features coming to the file system, researchers warn about flaws in NTP & of course we've got some critical patches.

Plus a great batch of questions, a rockin' round up & much, much more!

]]>
The OpenZFS summit just wrapped up and Allan shares the exciting new features coming to the file system, researchers warn about flaws in NTP & of course we've got some critical patches.

Plus a great batch of questions, a rockin' round up & much, much more!

]]>
The OpenZFS summit just wrapped up and Allan shares the exciting new features coming to the file system, researchers warn about flaws in NTP & of course we've got some critical patches.

Plus a great batch of questions, a rockin' round up & much, much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+KjdNOS7G ]]>
Episode 236: National Security Breaking Agency | TechSNAP 236 https://techsnap.systems/236 785D8E9F-CBA3-4703-B5FD-E5E808071A3F Thu, 15 Oct 2015 19:15:36 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting How the NSA might be breaking Crypto, fresh zero day exploit against Flash with a twist & Keylogging before computers. Plus a great batch of your questions, a rocking round-up & much more! 1:51:02 false How the NSA might be breaking Crypto, fresh zero day exploit against Flash with a twist & Keylogging before computers.

Plus a great batch of your questions, a rocking round-up & much more!

]]>
How the NSA might be breaking Crypto, fresh zero day exploit against Flash with a twist & Keylogging before computers.

Plus a great batch of your questions, a rocking round-up & much more!

]]>
How the NSA might be breaking Crypto, fresh zero day exploit against Flash with a twist & Keylogging before computers.

Plus a great batch of your questions, a rocking round-up & much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+JrJzYVc4 ]]>
Episode 235: Catching the Angler | TechSNAP 235 https://techsnap.systems/235 35E1A760-928E-43E4-B4E1-CAB4DA2AB054 Thu, 08 Oct 2015 19:32:14 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Debug mode exposes sensitive data, Cisco’s Talos group exposes the Angler exploit kit & how a Microsoft exposed Conficker with an egg hunt. Plus some great feedback, a huge round up & much, much more! 1:52:31 false Debug mode exposes sensitive data, Cisco’s Talos group exposes the Angler exploit kit & how a Microsoft exposed Conficker with an egg hunt.

Plus some great feedback, a huge round up & much, much more!

]]>
Debug mode exposes sensitive data, Cisco’s Talos group exposes the Angler exploit kit & how a Microsoft exposed Conficker with an egg hunt.

Plus some great feedback, a huge round up & much, much more!

]]>
Debug mode exposes sensitive data, Cisco’s Talos group exposes the Angler exploit kit & how a Microsoft exposed Conficker with an egg hunt.

Plus some great feedback, a huge round up & much, much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+6ecYumP7 ]]>
Episode 234: Key Flaw With GPL | TechSNAP 234 https://techsnap.systems/234 EE711BF8-CE59-4841-A3F5-F6EC21BDBA27 Thu, 01 Oct 2015 10:38:52 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting D-Link publishes its private code signing keys, exploiting Windows Symbolic Links & why encryption is not sufficient protection. Plus some great questions, our answers, a rockin roundup & much, much more! 1:06:49 false D-Link publishes its private code signing keys, exploiting Windows Symbolic Links & why encryption is not sufficient protection.

Plus some great questions, our answers, a rockin roundup & much, much more!

]]>
D-Link publishes its private code signing keys, exploiting Windows Symbolic Links & why encryption is not sufficient protection.

Plus some great questions, our answers, a rockin roundup & much, much more!

]]>
D-Link publishes its private code signing keys, exploiting Windows Symbolic Links & why encryption is not sufficient protection.

Plus some great questions, our answers, a rockin roundup & much, much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+6omnE3TF ]]>
Episode 233: Dukes of Cyber Hazard | TechSNAP 233 https://techsnap.systems/233 7975021C-3D24-48B7-ABFE-63FE082F2383 Thu, 24 Sep 2015 08:18:04 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Let’s Encrypt hits a major milestone, F-Secure publishes their investigation into “The Dukes” & we dig into Tarsnap’s email confirmation bypass. Plus a great batch of your questions, a rocking round up & much, much more! 1:16:19 false Let’s Encrypt hits a major milestone, F-Secure publishes their investigation into “The Dukes” & we dig into Tarsnap’s email confirmation bypass.

Plus a great batch of your questions, a rocking round up & much, much more!

]]>
Let’s Encrypt hits a major milestone, F-Secure publishes their investigation into “The Dukes” & we dig into Tarsnap’s email confirmation bypass.

Plus a great batch of your questions, a rocking round up & much, much more!

]]>
Let’s Encrypt hits a major milestone, F-Secure publishes their investigation into “The Dukes” & we dig into Tarsnap’s email confirmation bypass.

Plus a great batch of your questions, a rocking round up & much, much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+7tHidcCo ]]>
Episode 232: Hardware Insecurity Module | TechSNAP 232 https://techsnap.systems/232 A204DDBC-E33E-46D7-8799-76F32C14BFA1 Thu, 17 Sep 2015 12:31:57 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting How Groupon made the switch to FreeBSD & why. Researches extract keys from a hardware module & Intel’s new CPU backed malware protection. Plus your questions, a great roundup & more! 1:04:42 false How Groupon made the switch to FreeBSD & why. Researches extract keys from a hardware module & Intel’s new CPU backed malware protection.

Plus your questions, a great roundup & more!

]]>
How Groupon made the switch to FreeBSD & why. Researches extract keys from a hardware module & Intel’s new CPU backed malware protection.

Plus your questions, a great roundup & more!

]]>
How Groupon made the switch to FreeBSD & why. Researches extract keys from a hardware module & Intel’s new CPU backed malware protection.

Plus your questions, a great roundup & more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+Y4QRRIVu ]]>
Episode 231: Leaky RSA Keys | TechSNAP 231 https://techsnap.systems/231 50C2D538-4638-4703-B1C6-2AEB3E05EF8D Thu, 10 Sep 2015 06:05:44 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Red Hat highlights how leaky many open source RSA implementations are, Netflix releases Sleepy Puppy & the Mac is definitely under attack. Plus some quick feedback, a rockin' roundup & much, much more! 1:16:16 false Red Hat highlights how leaky many open source RSA implementations are, Netflix releases Sleepy Puppy & the Mac is definitely under attack.

Plus some quick feedback, a rockin' roundup & much, much more!

]]>
Red Hat highlights how leaky many open source RSA implementations are, Netflix releases Sleepy Puppy & the Mac is definitely under attack.

Plus some quick feedback, a rockin' roundup & much, much more!

]]>
Red Hat highlights how leaky many open source RSA implementations are, Netflix releases Sleepy Puppy & the Mac is definitely under attack.

Plus some quick feedback, a rockin' roundup & much, much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+2z3nfOC5 ]]>
Episode 230: Trojan Family Ties | TechSNAP 230 https://techsnap.systems/230 BF9F8574-2B50-4F1A-BD7E-82BD9BFC1455 Thu, 03 Sep 2015 07:37:57 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Rooting your Android device might be more dangerous than you realize, why the insurance industry will take over InfoSec & the NSA prepares for Quantum encryption. Plus some great questions, a fantastic roundup & more! 1:09:50 false Rooting your Android device might be more dangerous than you realize, why the insurance industry will take over InfoSec & the NSA prepares for Quantum encryption.

Plus some great questions, a fantastic roundup & more!

]]>
Rooting your Android device might be more dangerous than you realize, why the insurance industry will take over InfoSec & the NSA prepares for Quantum encryption.

Plus some great questions, a fantastic roundup & more!

]]>
Rooting your Android device might be more dangerous than you realize, why the insurance industry will take over InfoSec & the NSA prepares for Quantum encryption.

Plus some great questions, a fantastic roundup & more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+AR1uXYKc ]]>
Episode 229: Extortion Startups | TechSNAP 229 https://techsnap.systems/229 ADCC8AAF-B246-48DC-AB8A-8392C83E4D55 Thu, 27 Aug 2015 20:24:30 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting The real fallout from the Ashley Madison hack gets personal. The Android StageFright patch that doesn’t cover all of the holes, and turning a KVM into a spying appliance. Plus a great batch of questions, our answers, a rocking round up & more! 1:44:24 false The real fallout from the Ashley Madison hack gets personal. The Android StageFright patch that doesn’t cover all of the holes, and turning a KVM into a spying appliance.

Plus a great batch of questions, our answers, and a rocking round up.

All that and a heck of a lot more on this week’s TechSNAP!

]]>
The real fallout from the Ashley Madison hack gets personal. The Android StageFright patch that doesn’t cover all of the holes, and turning a KVM into a spying appliance.

Plus a great batch of questions, our answers, and a rocking round up.

All that and a heck of a lot more on this week’s TechSNAP!

]]>
The real fallout from the Ashley Madison hack gets personal. The Android StageFright patch that doesn’t cover all of the holes, and turning a KVM into a spying appliance.

Plus a great batch of questions, our answers, and a rocking round up.

All that and a heck of a lot more on this week’s TechSNAP!

]]>
https://fireside.fm/player/v2/sHzmXDIv+mjyLIza- ]]>
Episode 228: Export Grade Vulnerabilities | TechSNAP 228 https://techsnap.systems/228 777466F2-F0F3-4569-9BF9-E8D3DA64DBD0 Thu, 20 Aug 2015 10:03:43 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Lenovo & HP are caught injecting malware even after you format the drive, Ubiquiti Networks is socially engineered out of 46 million & are we entering the era of Security Research Prohibition? We debate. Plus your questions, the roundup & much, much more! 1:12:27 false Lenovo & HP are caught injecting malware even after you format the drive, Ubiquiti Networks is socially engineered out of 46 million & are we entering the era of Security Research Prohibition? We debate.

Plus a great batch of your questions, our answers, a rocking round up & much much more!

]]>
Lenovo & HP are caught injecting malware even after you format the drive, Ubiquiti Networks is socially engineered out of 46 million & are we entering the era of Security Research Prohibition? We debate.

Plus a great batch of your questions, our answers, a rocking round up & much much more!

]]>
Lenovo & HP are caught injecting malware even after you format the drive, Ubiquiti Networks is socially engineered out of 46 million & are we entering the era of Security Research Prohibition? We debate.

Plus a great batch of your questions, our answers, a rocking round up & much much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+UhZJUw9g ]]>
Episode 227: Oracle's EULAgy #oraclefanfic | TechSNAP 227 https://techsnap.systems/227 9969434A-E5A8-492A-B076-5E0EB6A994C0 Thu, 13 Aug 2015 15:46:04 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Oracle really doesn’t want you to reverse engineer their products but they may have just released the Kraken, we’ll explain. A massive drop of 35 fixes in one day, great feedback and follow up, a rockin roundup & much, much more! 1:13:51 false Oracle really doesn’t want you to reverse engineer their products but they may have just released the Kraken, we’ll explain.

A massive drop of 35 fixes in one day, great feedback and follow up, a rockin roundup & much, much more!

]]>
Oracle really doesn’t want you to reverse engineer their products but they may have just released the Kraken, we’ll explain.

A massive drop of 35 fixes in one day, great feedback and follow up, a rockin roundup & much, much more!

]]>
Oracle really doesn’t want you to reverse engineer their products but they may have just released the Kraken, we’ll explain.

A massive drop of 35 fixes in one day, great feedback and follow up, a rockin roundup & much, much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+n8ImjvzE ]]>
Episode 226: Solving the Flash Plague | TechSNAP 226 https://techsnap.systems/226 CCE10EB8-58A2-4459-A8E4-55D0454233A4 Fri, 07 Aug 2015 08:37:15 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Adobe is making changes to Flash to mitigate 0day exploits, with help from Google. Chrysler recalls 1.4M vehicles due to a software flaw, we go inside the “Business Club” cyber crime gang. Plus a great batch of questions, the roundup & more! 1:23:43 false Adobe is making changes to Flash to mitigate 0day exploits, with help from Google. Chrysler recalls 1.4M vehicles due to a software flaw, we go inside the “Business Club” cyber crime gang.

Plus a great batch of questions, the roundup & more!

]]>
Adobe is making changes to Flash to mitigate 0day exploits, with help from Google. Chrysler recalls 1.4M vehicles due to a software flaw, we go inside the “Business Club” cyber crime gang.

Plus a great batch of questions, the roundup & more!

]]>
Adobe is making changes to Flash to mitigate 0day exploits, with help from Google. Chrysler recalls 1.4M vehicles due to a software flaw, we go inside the “Business Club” cyber crime gang.

Plus a great batch of questions, the roundup & more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+TWzFTSdR ]]>
Episode 225: SourceForge's Downfall | TechSNAP 225 https://techsnap.systems/225 F56BF4E3-994E-411D-B81E-3D71CCB83E95 Thu, 30 Jul 2015 18:07:22 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting SourceForge sees downtime, and we examine their infrastructure, a new pervasive hackgroup has been exposed and their track record is fascinating. Plus a Hacking Team Round up, a wide variety of audience questions, our answers & much, much more! 1:04:45 false SourceForge sees downtime, and we examine their infrastructure, a new pervasive hackgroup has been exposed and their track record is fascinating.

Plus a Hacking Team Round up, a wide variety of audience questions, our answers & much, much more!

]]>
SourceForge sees downtime, and we examine their infrastructure, a new pervasive hackgroup has been exposed and their track record is fascinating.

Plus a Hacking Team Round up, a wide variety of audience questions, our answers & much, much more!

]]>
SourceForge sees downtime, and we examine their infrastructure, a new pervasive hackgroup has been exposed and their track record is fascinating.

Plus a Hacking Team Round up, a wide variety of audience questions, our answers & much, much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+gSNXsm1Y ]]>
Episode 224: Butterflies & Backronyms | TechSNAP 224 https://techsnap.systems/224 9C8DEB20-F4DC-4950-9C20-A6AF63FF5CCB Thu, 23 Jul 2015 10:47:37 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting The Backronym vulnerability hits MySQL right in the SSL protection, we’ll share the details. The hacker Group that hit Apple & Microsoft intensifies their attacks, a survey shows many core Linux tools are at risk & much, much more! 1:10:25 false The Backronym vulnerability hits MySQL right in the SSL protection, we’ll share the details. The hacker Group that hit Apple & Microsoft intensifies their attacks & a survey shows many core Linux tools are at risk.

Plus some great questions, a rockin' roundup & much much more!

]]>
The Backronym vulnerability hits MySQL right in the SSL protection, we’ll share the details. The hacker Group that hit Apple & Microsoft intensifies their attacks & a survey shows many core Linux tools are at risk.

Plus some great questions, a rockin' roundup & much much more!

]]>
The Backronym vulnerability hits MySQL right in the SSL protection, we’ll share the details. The hacker Group that hit Apple & Microsoft intensifies their attacks & a survey shows many core Linux tools are at risk.

Plus some great questions, a rockin' roundup & much much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+1xpcUHWq ]]>
Episode 223: A Bias to Insecurity | TechSNAP 223 https://techsnap.systems/223 A847AE0A-F23C-4A84-AFE0-5D3C68BF1500 Thu, 16 Jul 2015 16:57:24 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting The Hacking Team fallout continues with more zero day patches you need to install, a new attack against RC4 might finally kill it & how to save yourself from a DDoS attack. Plus a great batch of your questions, our answers & much, much more! 1:22:12 false The Hacking Team fallout continues with more zero day patches you need to install, a new attack against RC4 might finally kill it & how to save yourself from a DDoS attack.

Plus a great batch of your questions, our answers & much, much more!

]]>
The Hacking Team fallout continues with more zero day patches you need to install, a new attack against RC4 might finally kill it & how to save yourself from a DDoS attack.

Plus a great batch of your questions, our answers & much, much more!

]]>
The Hacking Team fallout continues with more zero day patches you need to install, a new attack against RC4 might finally kill it & how to save yourself from a DDoS attack.

Plus a great batch of your questions, our answers & much, much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+fKPmkDUo ]]>
Episode 222: ZFS does not prevent Stupidity | TechSNAP 222 https://techsnap.systems/222 E59BB705-094E-4413-85A0-50E9772A0E4E Thu, 09 Jul 2015 17:49:51 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting From hacking to hacked, hacking team gets owned & what gets leaked is the best part, we’ll share the details. Plus, a new OpenSSL vulnerability revealed, Apple tweaks their two factor authentication.. Your questions, our answers & much much more! 1:22:52 false From hacking to hacked, hacking team gets owned & what gets leaked is the best part, we’ll share the details.

Plus, a new OpenSSL vulnerability revealed, Apple tweaks their two factor authentication.. Your questions, our answers & much much more!

]]>
From hacking to hacked, hacking team gets owned & what gets leaked is the best part, we’ll share the details.

Plus, a new OpenSSL vulnerability revealed, Apple tweaks their two factor authentication.. Your questions, our answers & much much more!

]]>
From hacking to hacked, hacking team gets owned & what gets leaked is the best part, we’ll share the details.

Plus, a new OpenSSL vulnerability revealed, Apple tweaks their two factor authentication.. Your questions, our answers & much much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+fpfVaYDk ]]>
Episode 221: Ripping me a new Protocol | TechSNAP 221 https://techsnap.systems/221 7281412A-3455-45D5-B9E1-674BD871F50E Thu, 02 Jul 2015 20:08:21 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Amazon has a new TLS implementation & the details look great, we’ll share them with you. The technology that powers the NSA’s XKEYSCORE you could have deployed yourself. Some fantastic questions, a big round up & much, much more! 1:48:29 false Amazon has a new TLS implementation & the details look great, we’ll share them with you. The technology that powers the NSA’s XKEYSCORE you could have deployed yourself.

Some fantastic questions, a big round up & much, much more!

]]>
Amazon has a new TLS implementation & the details look great, we’ll share them with you. The technology that powers the NSA’s XKEYSCORE you could have deployed yourself.

Some fantastic questions, a big round up & much, much more!

]]>
Amazon has a new TLS implementation & the details look great, we’ll share them with you. The technology that powers the NSA’s XKEYSCORE you could have deployed yourself.

Some fantastic questions, a big round up & much, much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+FEsaeAKU ]]>
Episode 220: Homeland Insecurity | TechSNAP 220 https://techsnap.systems/220 AF7A9CEA-0104-4361-877C-E889EB8284D0 Thu, 25 Jun 2015 19:05:38 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Google’s datacenter secrets are finally being revealed & we’ll share the best bits. Why The US Government is in no position to teach anyone about Cyber Security, how you can still get hacked offline, Great questions, a huge round up & much, much more! 1:28:04 false Google’s datacenter secrets are finally being revealed & we’ll share the best bits. Why The US Government is in no position to teach anyone about Cyber Security, how you can still get hacked offline, A batch of great questions, a huge round up & much, much more!

]]>
Google’s datacenter secrets are finally being revealed & we’ll share the best bits. Why The US Government is in no position to teach anyone about Cyber Security, how you can still get hacked offline, A batch of great questions, a huge round up & much, much more!

]]>
Google’s datacenter secrets are finally being revealed & we’ll share the best bits. Why The US Government is in no position to teach anyone about Cyber Security, how you can still get hacked offline, A batch of great questions, a huge round up & much, much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+gc9qEBSz ]]>
Episode 219: OPM Data too Valuable to Sell | TechSNAP 219 https://techsnap.systems/219 87540137-B9F2-4A78-8C29-754E71985A77 Thu, 18 Jun 2015 19:14:26 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Kaspersky labs has been hacked, we’ll tell you why it looks like a nation state was the attacker, why OPM data is too valuable sell & the real situation with LastPass. Plus some great questions, our answers & a rocking round up. 1:44:07 false Kaspersky labs has been hacked, we’ll tell you why it looks like a nation state was the attacker, why OPM data is too valuable sell & the real situation with LastPass.

Plus some great questions, our answers & a rocking round up.

All that and much, much more on this week’s TechSNAP!

]]>
Kaspersky labs has been hacked, we’ll tell you why it looks like a nation state was the attacker, why OPM data is too valuable sell & the real situation with LastPass.

Plus some great questions, our answers & a rocking round up.

All that and much, much more on this week’s TechSNAP!

]]>
Kaspersky labs has been hacked, we’ll tell you why it looks like a nation state was the attacker, why OPM data is too valuable sell & the real situation with LastPass.

Plus some great questions, our answers & a rocking round up.

All that and much, much more on this week’s TechSNAP!

]]>
https://fireside.fm/player/v2/sHzmXDIv+CoraCEb7 ]]>
Episode 218: Hacking Henchmen for Hire | TechSNAP 218 https://techsnap.systems/218 1AFD7D92-CFB1-4741-94F0-05C95E2F6F65 Thu, 11 Jun 2015 11:22:54 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting This week, how hard lessons learned in 1982 could be apply to 2015’s security breaches, hacking for hire goes big & a savage sentient car that needs better programming. Plus some fantastic questions, a rocking round-up & much more! 1:23:29 false This week, how hard lessons learned in 1982 could be apply to 2015’s security breaches, hacking for hire goes big & a savage sentient car that needs better programming.

Plus some fantastic questions, a rocking round-up & much more!

]]>
This week, how hard lessons learned in 1982 could be apply to 2015’s security breaches, hacking for hire goes big & a savage sentient car that needs better programming.

Plus some fantastic questions, a rocking round-up & much more!

]]>
This week, how hard lessons learned in 1982 could be apply to 2015’s security breaches, hacking for hire goes big & a savage sentient car that needs better programming.

Plus some fantastic questions, a rocking round-up & much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+RGcD8bVQ ]]>
Episode 217: An Encryptioner's Conscience | TechSNAP 217 https://techsnap.systems/217 7EAB3C29-10F8-4647-9517-1CD0C36D8235 Thu, 04 Jun 2015 18:41:58 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting The sad state of SMTP encryption, a new huge round of flaws has been found in consumer routers & the reviews of Intel’s new Broadwell desktop processors are in! Plus some great questions, a huge round-up & much, much more! 1:44:56 false The sad state of SMTP encryption, a new huge round of flaws has been found in consumer routers & the reviews of Intel’s new Broadwell desktop processors are in!

Plus some great questions, a huge round-up & much, much more!

]]>
The sad state of SMTP encryption, a new huge round of flaws has been found in consumer routers & the reviews of Intel’s new Broadwell desktop processors are in!

Plus some great questions, a huge round-up & much, much more!

]]>
The sad state of SMTP encryption, a new huge round of flaws has been found in consumer routers & the reviews of Intel’s new Broadwell desktop processors are in!

Plus some great questions, a huge round-up & much, much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+V-qnnBcN ]]>
Episode 216: Spy vs MSpy | TechSNAP 216 https://techsnap.systems/216 E470238B-072B-4EED-B85D-6F1CE396B535 Thu, 28 May 2015 09:37:04 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Spyware creator mSpy hacked, find out why this breach is particularly egregious, what’s wrong with pcap & why RSA’s death has been greatly exaggerated. Plus a great batch of questions, a rocking round up & much, much more! 1:25:03 false Spyware creator mSpy hacked, find out why this breach is particularly egregious, what’s wrong with pcap & why RSA’s death has been greatly exaggerated.

Plus a great batch of questions, a rocking round up & much, much more!

]]>
Spyware creator mSpy hacked, find out why this breach is particularly egregious, what’s wrong with pcap & why RSA’s death has been greatly exaggerated.

Plus a great batch of questions, a rocking round up & much, much more!

]]>
Spyware creator mSpy hacked, find out why this breach is particularly egregious, what’s wrong with pcap & why RSA’s death has been greatly exaggerated.

Plus a great batch of questions, a rocking round up & much, much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+0AWFrjK3 ]]>
Episode 215: EXTenuating Circumstances | TechSNAP 215 https://techsnap.systems/215 3E1A0E82-9540-4C50-8C8E-F6D9D1B4A2BC Thu, 21 May 2015 16:52:08 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Researches have uncovered a weakness in almost all Internet encryption. We’ll explain what LogJam is, how to protect yourself & what the cause is. Plus Linux gets bit by a filesystem corruption bug, passport id thieves, a great batch of questions & more! 1:26:49 false Researches have uncovered a weakness in almost all Internet encryption. We’ll explain what LogJam is, how to protect yourself & what the cause is.

Linux gets bit by a filesystem corruption bug, passport id thieves, a great batch of questions & much, much more!

]]>
Researches have uncovered a weakness in almost all Internet encryption. We’ll explain what LogJam is, how to protect yourself & what the cause is.

Linux gets bit by a filesystem corruption bug, passport id thieves, a great batch of questions & much, much more!

]]>
Researches have uncovered a weakness in almost all Internet encryption. We’ll explain what LogJam is, how to protect yourself & what the cause is.

Linux gets bit by a filesystem corruption bug, passport id thieves, a great batch of questions & much, much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+O_9QH_DA ]]>
Episode 214: Venomous Floppy Legacy | TechSNAP 214 https://techsnap.systems/214 E04ADA41-CC10-4363-8A68-8D9CB863D482 Thu, 14 May 2015 19:51:07 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting We explain the Venom vulnerability, what the impact is & the steps major providers are taking to protect themselves. Plus strategies to mitigate Cyber Intrusions, a truly genius spammer, great questions, a huge round up & more! 1:50:26 false We explain the Venom vulnerability, what the impact is & the steps major providers are taking to protect themselves.

Plus strategies to mitigate Cyber Intrusions, a truly genius spammer, great questions, a huge round up & more!

]]>
We explain the Venom vulnerability, what the impact is & the steps major providers are taking to protect themselves.

Plus strategies to mitigate Cyber Intrusions, a truly genius spammer, great questions, a huge round up & more!

]]>
We explain the Venom vulnerability, what the impact is & the steps major providers are taking to protect themselves.

Plus strategies to mitigate Cyber Intrusions, a truly genius spammer, great questions, a huge round up & more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+kqvk8Rjn ]]>
Episode 213: Blame as a Service | TechSNAP 213 https://techsnap.systems/213 8966B174-71FB-4B0E-8A28-B8070A65D063 Thu, 07 May 2015 18:45:37 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Why a stolen healthcare record is harder to track than you might think, Security pros name their must have tools & blame as a service, the new Cybersecurity hot product. Plus great questions, a huge Round Up & much, much more! 1:38:16 false Why a stolen healthcare record is harder to track than you might think, Security pros name their must have tools & blame as a service, the new Cybersecurity hot product.

Plus great questions, a huge Round Up & much, much more!

]]>
Why a stolen healthcare record is harder to track than you might think, Security pros name their must have tools & blame as a service, the new Cybersecurity hot product.

Plus great questions, a huge Round Up & much, much more!

]]>
Why a stolen healthcare record is harder to track than you might think, Security pros name their must have tools & blame as a service, the new Cybersecurity hot product.

Plus great questions, a huge Round Up & much, much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+Rfuo6Wr9 ]]>
Episode 212: Dormant Docker Disasters | TechSNAP 212 https://techsnap.systems/212 FAED937D-50A8-49CE-AC43-FE5E6E3C3CA2 Thu, 30 Apr 2015 11:36:22 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting The man who broke the music business, the major downsides to the container culture & yes, they really are trying to sell you Security Snake Oil. Plus your great questions, our answers & much, much more! 1:33:35 false The man who broke the music business, the major downsides to the container culture & yes, they really are trying to sell you Security Snake Oil.

Plus your great questions, our answers & much, much more!

]]>
The man who broke the music business, the major downsides to the container culture & yes, they really are trying to sell you Security Snake Oil.

Plus your great questions, our answers & much, much more!

]]>
The man who broke the music business, the major downsides to the container culture & yes, they really are trying to sell you Security Snake Oil.

Plus your great questions, our answers & much, much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+ui9sYBKM ]]>
Episode 211: The French Disconnection | TechSNAP 211 https://techsnap.systems/211 EF12EFC5-45DB-4913-9272-B299CA2CA4A9 Fri, 24 Apr 2015 02:17:34 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting What’s really the key to detecting a breach before its become much too late? We’ll share some key insights, plus a technical breakdown of China’s great cannon & the new New French Surveillance Law that should be a warning to us all & much, much more! 1:47:00 false What’s really the key to detecting a breach before its become much too late? We’ll share some key insights, plus a technical breakdown of China’s great cannon & the new New French Surveillance Law that should be a warning to us all.

Plus a great round up, fantastic questions, our answers & much, much more!

]]>
What’s really the key to detecting a breach before its become much too late? We’ll share some key insights, plus a technical breakdown of China’s great cannon & the new New French Surveillance Law that should be a warning to us all.

Plus a great round up, fantastic questions, our answers & much, much more!

]]>
What’s really the key to detecting a breach before its become much too late? We’ll share some key insights, plus a technical breakdown of China’s great cannon & the new New French Surveillance Law that should be a warning to us all.

Plus a great round up, fantastic questions, our answers & much, much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+jXIVKpuB ]]>
Episode 210: SMBTrapped in Microsoft | TechSNAP 210 https://techsnap.systems/210 69AEB932-C1E9-449A-8D0E-2B26B6F0684F Thu, 16 Apr 2015 20:03:17 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Researches find an 18 year old bug in Windows thats rather nasty, we’ve got the details. A new perspective on the bug bounty arms race & the security impact of Wifi on a plane. Plus great feedback, a bursting round up & much much more! 1:23:53 false Researches find an 18 year old bug in Windows thats rather nasty, we’ve got the details. A new perspective on the bug bounty arms race & the security impact of Wifi on a plane.

Plus great feedback, a bursting round up & much much more!

]]>
Researches find an 18 year old bug in Windows thats rather nasty, we’ve got the details. A new perspective on the bug bounty arms race & the security impact of Wifi on a plane.

Plus great feedback, a bursting round up & much much more!

]]>
Researches find an 18 year old bug in Windows thats rather nasty, we’ve got the details. A new perspective on the bug bounty arms race & the security impact of Wifi on a plane.

Plus great feedback, a bursting round up & much much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+v0uS2YCC ]]>
Episode 209: Day-0 of an InfoSec Career | TechSNAP 209 https://techsnap.systems/209 3D433430-44B6-441E-B4E5-397784A99DE9 Thu, 09 Apr 2015 21:03:21 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Is it possible to make a truly private phone call anymore? The answer might surprise you. Cisco and Level 3 battle a huge SSH botnet & how to Build a successful Information Security career & much, much more! 2:09:23 false Is it possible to make a truly private phone call anymore? The answer might surprise you. Cisco and Level 3 battle a huge SSH botnet & how to Build a successful Information Security career.

Plus a great batch of your questions, a rocking round up, and much, much more!

]]>
Is it possible to make a truly private phone call anymore? The answer might surprise you. Cisco and Level 3 battle a huge SSH botnet & how to Build a successful Information Security career.

Plus a great batch of your questions, a rocking round up, and much, much more!

]]>
Is it possible to make a truly private phone call anymore? The answer might surprise you. Cisco and Level 3 battle a huge SSH botnet & how to Build a successful Information Security career.

Plus a great batch of your questions, a rocking round up, and much, much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+3UXXdSh2 ]]>
Episode 208: Any Cert Will Do | TechSNAP 208 https://techsnap.systems/208 9BB34B95-1EA5-4B32-9B61-5D919EDC03D7 Thu, 02 Apr 2015 17:53:44 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Why boring technology might be the better choice, Google revokes & China chokes, why you want to create an account at irs.gov before crooks do it for you. Plus your great IT questions, a rocking round up & much, much more! 1:23:13 false Why boring technology might be the better choice, Google revokes & China chokes, why you want to create an account at irs.gov before crooks do it for you.

Plus your great IT questions, a rocking round up & much, much more!

]]>
Why boring technology might be the better choice, Google revokes & China chokes, why you want to create an account at irs.gov before crooks do it for you.

Plus your great IT questions, a rocking round up & much, much more!

]]>
Why boring technology might be the better choice, Google revokes & China chokes, why you want to create an account at irs.gov before crooks do it for you.

Plus your great IT questions, a rocking round up & much, much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+ZhFo2SrA ]]>
Episode 207: Lunch Lady Lockdown | TechSNAP 207 https://techsnap.systems/207 B2F3CC53-6940-412C-A3F0-2F592AC736E1 Thu, 26 Mar 2015 19:40:35 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Reverse Engineering Incentives to Improve Security. New Jersey school district computers held for ransom & the flash bug that lives on from 2011 with a twist! Plus some great networking questions, drone powered Internet & more! 1:26:32 false Reverse Engineering Incentives to Improve Security. New Jersey school district computers held for ransom & the flash bug that lives on from 2011 with a twist!

Plus some great networking questions, drone powered Internet & more!

]]>
Reverse Engineering Incentives to Improve Security. New Jersey school district computers held for ransom & the flash bug that lives on from 2011 with a twist!

Plus some great networking questions, drone powered Internet & more!

]]>
Reverse Engineering Incentives to Improve Security. New Jersey school district computers held for ransom & the flash bug that lives on from 2011 with a twist!

Plus some great networking questions, drone powered Internet & more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+wgn_KG35 ]]>
Episode 206: Two Factor Falsification | TechSNAP 206 https://techsnap.systems/206 0D0A04E1-44D7-4D42-A8F6-1A42ECC8D70C Thu, 19 Mar 2015 20:02:12 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Microsoft takes 4 years to fix a nasty bug, how to bypass 2 factor authentication in the popular ‘Authy’ app. Hijacking a domain with photoshop, hardware vs software RAID revisited, tons of great questions, our answers & much much more! 1:39:30 false Microsoft takes 4 years to fix a nasty bug, how to bypass 2 factor authentication in the popular ‘Authy’ app.

Hijacking a domain with photoshop, hardware vs software RAID revisited, tons of great questions, our answers & much much more!

]]>
Microsoft takes 4 years to fix a nasty bug, how to bypass 2 factor authentication in the popular ‘Authy’ app.

Hijacking a domain with photoshop, hardware vs software RAID revisited, tons of great questions, our answers & much much more!

]]>
Microsoft takes 4 years to fix a nasty bug, how to bypass 2 factor authentication in the popular ‘Authy’ app.

Hijacking a domain with photoshop, hardware vs software RAID revisited, tons of great questions, our answers & much much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+bIW-qsiL ]]>
Episode 205: An Uber Mess | TechSNAP 205 https://techsnap.systems/205 E91A0B80-BB82-4953-A9D4-5C0A9BF9952D Thu, 12 Mar 2015 09:56:00 -0700 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Using encryption is a good thing, but its just the start, we’ll explain. Plus how one developer totally owned the Uber app. Then it’s a great batch of your questions & our answers! 1:03:48 false Using encryption is a good thing, but its just the start, we’ll explain. Plus how one developer totally owned the Uber app.

Then it’s a great batch of your questions & our answers!

]]>
Using encryption is a good thing, but its just the start, we’ll explain. Plus how one developer totally owned the Uber app.

Then it’s a great batch of your questions & our answers!

]]>
Using encryption is a good thing, but its just the start, we’ll explain. Plus how one developer totally owned the Uber app.

Then it’s a great batch of your questions & our answers!

]]>
https://fireside.fm/player/v2/sHzmXDIv+MAd8rGEO ]]>
Episode 204: Ghost of Crypto Past | TechSNAP 204 https://techsnap.systems/204 410EB629-FB86-4CDC-B8C0-3250F19E0E97 Thu, 05 Mar 2015 17:54:51 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting We’ll break down the technical baggage that led to the new FREAK SSL flaw & the security ramifications of top executives using personal email accounts… Plus why just need to stop hiding file extensions. Plus some great feedback & much, much more! 1:38:11 false We’ll break down the technical baggage that led to the new FREAK SSL flaw & the security ramifications of top executives using personal email accounts…

Plus why just need to stop hiding file extensions. Plus some great feedback & much, much more!

]]>
We’ll break down the technical baggage that led to the new FREAK SSL flaw & the security ramifications of top executives using personal email accounts…

Plus why just need to stop hiding file extensions. Plus some great feedback & much, much more!

]]>
We’ll break down the technical baggage that led to the new FREAK SSL flaw & the security ramifications of top executives using personal email accounts…

Plus why just need to stop hiding file extensions. Plus some great feedback & much, much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+J4GwPlaM ]]>
Episode 203: TurboHax | TechSNAP 203 https://techsnap.systems/203 DBEF5DB6-48D5-438E-980B-297C84CE813F Thu, 26 Feb 2015 21:15:28 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Lenovo & Google are victims of DNS hijacking, we’ll share the details, Everyone wants you to secure your data, just not from them & how Turbotax profits from Cyber tax fraud! Plus a great batch of your questions, a fantastic round up & much, much more! 1:47:17 false Lenovo & Google are victims of DNS hijacking, we’ll share the details, Everyone wants you to secure your data, just not from them & how Turbotax profits from Cyber tax fraud!

Plus a great batch of your questions, a fantastic round up & much, much more!

]]>
Lenovo & Google are victims of DNS hijacking, we’ll share the details, Everyone wants you to secure your data, just not from them & how Turbotax profits from Cyber tax fraud!

Plus a great batch of your questions, a fantastic round up & much, much more!

]]>
Lenovo & Google are victims of DNS hijacking, we’ll share the details, Everyone wants you to secure your data, just not from them & how Turbotax profits from Cyber tax fraud!

Plus a great batch of your questions, a fantastic round up & much, much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+zik4pjP4 ]]>
Episode 202: SuperFishy Mistake | TechSNAP 202 https://techsnap.systems/202 5C937351-557D-46C3-9620-5BFCC6A6964D Thu, 19 Feb 2015 17:29:15 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Lenovo PCs ship with man-in-the-middle adware that breaks HTTPS connections, we’ll break down how this is possible, the danger that still exists & more. Plus the story of a billion dollar cyber heist anyone could pull off, the Equation group & much more! 1:11:57 false Lenovo PCs ship with man-in-the-middle adware that breaks HTTPS connections, we’ll break down how this is possible, the danger that still exists & more.

Plus the story of a billion dollar cyber heist anyone could pull off, the Equation group, your questions, our answers & much much more!

]]>
Lenovo PCs ship with man-in-the-middle adware that breaks HTTPS connections, we’ll break down how this is possible, the danger that still exists & more.

Plus the story of a billion dollar cyber heist anyone could pull off, the Equation group, your questions, our answers & much much more!

]]>
Lenovo PCs ship with man-in-the-middle adware that breaks HTTPS connections, we’ll break down how this is possible, the danger that still exists & more.

Plus the story of a billion dollar cyber heist anyone could pull off, the Equation group, your questions, our answers & much much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+XTblicSy ]]>
Episode 201: Group Problemcy | TechSNAP 201 https://techsnap.systems/201 833C5608-467C-4F68-BADF-E288D6BD7DB1 Thu, 12 Feb 2015 19:07:53 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting A 20 year old design flaw in Windows has just been patched & it requires some major re-working of the software. Attackers compromise Forbes.com & why Facebook’s new ThreatExchange platform could be a great idea. 1:34:06 false A 20 year old design flaw in Windows has just been patched & it requires some major re-working of the software. Attackers compromise Forbes.com & why Facebook’s new ThreatExchange platform could be a great idea.

Plus a great batch of feedback, our answers & much much more!

]]>
A 20 year old design flaw in Windows has just been patched & it requires some major re-working of the software. Attackers compromise Forbes.com & why Facebook’s new ThreatExchange platform could be a great idea.

Plus a great batch of feedback, our answers & much much more!

]]>
A 20 year old design flaw in Windows has just been patched & it requires some major re-working of the software. Attackers compromise Forbes.com & why Facebook’s new ThreatExchange platform could be a great idea.

Plus a great batch of feedback, our answers & much much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+I-EpVOXj ]]>
Episode 200: Your TechSNAP Story | TechSNAP 200 https://techsnap.systems/200 E4F74996-8A43-4FA0-A278-3129AAC2A67F Thu, 05 Feb 2015 19:51:18 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting A new major security breach at a large health insurance firm could expose 10s of millions, a phone phishing scam anyone could fall for & we celebrate our 200th episode with your TechSNAP stories. Then its a storage spectacular Q&A & much, much more! 1:39:25 false A new major security breach at a large health insurance firm could expose 10s of millions, a phone phishing scam anyone could fall for & we celebrate our 200th episode with your TechSNAP stories.

Then its a storage spectacular Q&A & much, much more!

]]>
A new major security breach at a large health insurance firm could expose 10s of millions, a phone phishing scam anyone could fall for & we celebrate our 200th episode with your TechSNAP stories.

Then its a storage spectacular Q&A & much, much more!

]]>
A new major security breach at a large health insurance firm could expose 10s of millions, a phone phishing scam anyone could fall for & we celebrate our 200th episode with your TechSNAP stories.

Then its a storage spectacular Q&A & much, much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+jitIjcrt ]]>
Episode 199: Internet of Problems | TechSNAP 199 https://techsnap.systems/199 F42D877B-E652-45C4-A06E-D526EB3BAEB0 Thu, 29 Jan 2015 18:56:32 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting The internet of dangerous things is arriving but what about taking care of the devices we already have? Plus details on critical updates from Adobe, the surprising number of Gas Stations vulnerable to exploitation via the internet & much, much more! 1:24:34 false The internet of dangerous things is arriving but what about taking care of the devices we already have? We’ll discuss!

Plus details on critical updates from Adobe, the surprising number of Gas Stations vulnerable to exploitation via the internet, your questions, our answers & much, much more!

]]>
The internet of dangerous things is arriving but what about taking care of the devices we already have? We’ll discuss!

Plus details on critical updates from Adobe, the surprising number of Gas Stations vulnerable to exploitation via the internet, your questions, our answers & much, much more!

]]>
The internet of dangerous things is arriving but what about taking care of the devices we already have? We’ll discuss!

Plus details on critical updates from Adobe, the surprising number of Gas Stations vulnerable to exploitation via the internet, your questions, our answers & much, much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+qd4cCne2 ]]>
Episode 198: Dude Where's My Card? | TechSNAP 198 https://techsnap.systems/198 FF3C8952-6100-4E18-B6BD-27E24BC80B69 Thu, 22 Jan 2015 21:17:32 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Adobe has a bad week, with exploits in the wild & no patch. We’ll share the details. Had your credit card stolen? We’ll tell you how. Plus the harsh reality for IT departments, a great batch of questions, our answers & much much more! 1:44:56 false Adobe has a bad week, with exploits in the wild & no patch. We’ll share the details. Had your credit card stolen? We’ll tell you how.

Plus the harsh reality for IT departments, a great batch of questions, our answers & much much more!

]]>
Adobe has a bad week, with exploits in the wild & no patch. We’ll share the details. Had your credit card stolen? We’ll tell you how.

Plus the harsh reality for IT departments, a great batch of questions, our answers & much much more!

]]>
Adobe has a bad week, with exploits in the wild & no patch. We’ll share the details. Had your credit card stolen? We’ll tell you how.

Plus the harsh reality for IT departments, a great batch of questions, our answers & much much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+7c3lirPE ]]>
Episode 197: Patch and Notify | TechSNAP 197 https://techsnap.systems/197 9B822D20-CBBF-4C25-990C-C1A039BBFCC6 Thu, 15 Jan 2015 22:26:51 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting Been putting off that patch? This week we’ll cover how an out of date Joomla install led to a massive breach, Microsoft and Google spar over patch disclosures, picking the right security question & more! 2:01:07 false Been putting off that patch? This week we’ll cover how an out of date Joomla install led to a massive breach, Microsoft and Google spar over patch disclosures & picking the right security question...

Plus a great batch of your feedback, a rocking round up & much, much more!

]]>
Been putting off that patch? This week we’ll cover how an out of date Joomla install led to a massive breach, Microsoft and Google spar over patch disclosures & picking the right security question...

Plus a great batch of your feedback, a rocking round up & much, much more!

]]>
Been putting off that patch? This week we’ll cover how an out of date Joomla install led to a massive breach, Microsoft and Google spar over patch disclosures & picking the right security question...

Plus a great batch of your feedback, a rocking round up & much, much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+nIvSa2GU ]]>
Episode 196: Sony’s Hard Lessons | TechSNAP 196 https://techsnap.systems/196 220FD560-AB34-42B7-81E3-537B194A74C9 Thu, 08 Jan 2015 19:45:48 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting We reflect on the lessons learned from the Sony Hack & discuss some of the tools used to own their network. Plus a overview of what makes up a filesystem, a run down of the Bacula backup system & much more! 1:45:51 false We reflect on the lessons learned from the Sony Hack & discuss some of the tools used to own their network.

Plus a overview of what makes up a filesystem, a run down of the Bacula backup system & much more!

]]>
We reflect on the lessons learned from the Sony Hack & discuss some of the tools used to own their network.

Plus a overview of what makes up a filesystem, a run down of the Bacula backup system & much more!

]]>
We reflect on the lessons learned from the Sony Hack & discuss some of the tools used to own their network.

Plus a overview of what makes up a filesystem, a run down of the Bacula backup system & much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+tdTrr4WC ]]>
Episode 195: Cloudy With a Chance of SSL | TechSNAP 195 https://techsnap.systems/195 03BE94A1-C43D-4CE3-B534-683C04B8A916 Thu, 01 Jan 2015 11:54:47 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting We go inside the epic takedown of SpamHaus, then we break down why CloudFlare’s Flexible SSL is the opposite of security. Followed by a great batch of questions, our answers & much much more! 1:09:20 false We go inside the epic takedown of SpamHaus, then we break down why CloudFlare’s Flexible SSL is the opposite of security.

Followed by a great batch of questions, our answers & much much more!

]]>
We go inside the epic takedown of SpamHaus, then we break down why CloudFlare’s Flexible SSL is the opposite of security.

Followed by a great batch of questions, our answers & much much more!

]]>
We go inside the epic takedown of SpamHaus, then we break down why CloudFlare’s Flexible SSL is the opposite of security.

Followed by a great batch of questions, our answers & much much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+OHr8EbYz ]]>
Episode 194: Best Of TechSNAP 2014 | TechSNAP 194 https://techsnap.systems/194 F58A0515-A7D0-457C-832E-D41086DF0B45 Thu, 25 Dec 2014 13:39:47 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting We look back at this year in TechSNAP. Allan shares his war stories, TrueCrypt shuts down, Heartbleed happens & more! 1:40:52 false We look back at this year in TechSNAP. Allan shares his war stories, TrueCrypt shuts down, Heartbleed happens & more!

]]>
We look back at this year in TechSNAP. Allan shares his war stories, TrueCrypt shuts down, Heartbleed happens & more!

]]>
We look back at this year in TechSNAP. Allan shares his war stories, TrueCrypt shuts down, Heartbleed happens & more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+l-q0lfRm ]]>
Episode 193: Don’t Fire IT | TechSNAP 193 https://techsnap.systems/193 7D37360F-5254-4895-8E17-D106879873C3 Thu, 18 Dec 2014 18:54:47 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting More and more data breaches are leading to blackmail but the stats don’t tell the whole story. We’ll explain. Plus the latest in the Sony hack, and the wider reaction. Plus a great batch of emails & much, much more! 1:33:10 false More and more data breaches are leading to blackmail but the stats don’t tell the whole story. We’ll explain.

Plus the latest in the Sony hack, and the wider reaction. Plus a great batch of emails & much, much more!

]]>
More and more data breaches are leading to blackmail but the stats don’t tell the whole story. We’ll explain.

Plus the latest in the Sony hack, and the wider reaction. Plus a great batch of emails & much, much more!

]]>
More and more data breaches are leading to blackmail but the stats don’t tell the whole story. We’ll explain.

Plus the latest in the Sony hack, and the wider reaction. Plus a great batch of emails & much, much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+JAjNxJgq ]]>
Episode 192: Signed by Sony | TechSNAP 192 https://techsnap.systems/192 868A8960-FD9B-40BE-8923-918EC18F496F Thu, 11 Dec 2014 18:52:43 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting If we could rebuild the Internet from scratch, what would we change? It’s more than just a thought experiment. We’ll share the details about real world research being done today! Plus we dig through the Sony hack, answer a ton of great question & a rocki 1:42:01 false If we could rebuild the Internet from scratch, what would we change? It’s more than just a thought experiment. We’ll share the details about real world research being done today!

Plus we dig through the Sony hack, answer a ton of great question & a rocking roundup!

]]>
If we could rebuild the Internet from scratch, what would we change? It’s more than just a thought experiment. We’ll share the details about real world research being done today!

Plus we dig through the Sony hack, answer a ton of great question & a rocking roundup!

]]>
If we could rebuild the Internet from scratch, what would we change? It’s more than just a thought experiment. We’ll share the details about real world research being done today!

Plus we dig through the Sony hack, answer a ton of great question & a rocking roundup!

]]>
https://fireside.fm/player/v2/sHzmXDIv+JE19oFJf ]]>
Episode 191: Celebrity Bugs | TechSNAP 191 https://techsnap.systems/191 AABF9C60-DD0D-414E-BA28-2FA568A0DE16 Thu, 04 Dec 2014 20:58:59 -0800 [email protected] (Jupiter Broadcasting) full Jupiter Broadcasting 2014 has been the year of the celebrity bugs, we take a look at the new trend of giving security vulnerabilities names & logos & ask who it truly benefits. Plus practical way to protect yourself from ATM Skimmers, how they work & much more! 1:54:27 false 2014 has been the year of the celebrity bugs, we take a look at the new trend of giving security vulnerabilities names & logos & ask who it truly benefits.

Plus practical way to protect yourself from ATM Skimmers, how they work & much more!

]]>
2014 has been the year of the celebrity bugs, we take a look at the new trend of giving security vulnerabilities names & logos & ask who it truly benefits.

Plus practical way to protect yourself from ATM Skimmers, how they work & much more!

]]>
2014 has been the year of the celebrity bugs, we take a look at the new trend of giving security vulnerabilities names & logos & ask who it truly benefits.

Plus practical way to protect yourself from ATM Skimmers, how they work & much more!

]]>
https://fireside.fm/player/v2/sHzmXDIv+SKygQE5W ]]>