Gesamtlänge aller Episoden: 15 days 1 hour 40 minutes
I take a few minutes to explain a quick mass renaming shortcut using sed I use when I have multiple files that I need to rename. I used the example of spaces in filenames, but you can use this to append a name to multiple files. Another way to...
We are pleased to be the only podcast to have audio of the talk Phil Beyer gave at Bsides Austin! It is a very informative talk about leadership, not just in Information Security, but how to be a leader in any field you do. Breaking...
This week, we got into some discussion about frameworks, and the different types of frameworks available (regulatory, "best practice", and process improvement) We also looked at the new "Framework for Improving Critical Infrastructure Cybersecurity"...
This is the Part 2 of our Interview with Kevin Johnson. During our interview, we followed him down the rabbit hole. We learned how to default rulesets in ANY rules based hardware solution sucks. We learned that being a security...
During our SEC542, GIAC Web App Pentesting course, we got the pleasure and honor of sitting down with Kevin Johnson from SecureIdeas on who he is, how Samurai WTF came into being, and why we should be doing licensing for proper ethcial...
This is part 2 of our Interview with Malware researcher Michael Gough. We talk about mobile device malware, and how the Sniper Forensic Toolkit, differs from Tripwire. Intro "Private Eye", transition "Mining by Moonlight", and Outro...
This week, we are excited to have Michael Gough, a local malware researcher from Mi2Security on with us to talk about types of malware, infection vectors, some of the tools that users have available to them to detect and prevent malware. We also...