
Watch Your Pi Hole – Episode 51
Episode in
In-Security
EP051 Watch Your Pi Hole
S2E2 drops with a discussion on DNS filtering and how to do it using cool tools like the Pi Hole.
This episode was not recorded in front of a live studio audience. The audience already left because it was very late at night. If there’s any low energy I’m attributing it to that.
Turns out DNS filtering is actually crazy cool. There’s a ton of power there and a lot of fun things you could do. There’s also a lot of practical uses we could put it to from both a home and small business perspective.
Don’t believe me? We talk about spying on your children, supplementing your income for your mom and pop shop and the Nintendo game Chronotrigger. How can that NOT have you listening already?!
This post was also written very late at night.
Originally Recorded March 20, 2019
Shownotes
The post Watch Your Pi Hole – Episode 51 appeared first on In-security Podcast.
38:04
5-D’oh Homer Security – Episode 50
Episode in
In-Security
EP050 5-D’oh Homer Security
Season two has kicked off Y’all with home security
I don’t get the seasons, or how they work. But whatever, that’s what’ we’re calling it.
This season we pivot to focus more on home security and all the tips tricks problems and solutions around what security minded home owners and folks who want to layer on a little protection to their home offices face.
We’re also going to try and give a little more airtime to small business since a lot of home security cross pollinates with super small businesses.
I’m not saying this is going to be the best season of this show yet.
But i’m not NOT saying that.
ENJOY!
Originally Recorded March 1, 2019
Shownotes
The post 5-D’oh Homer Security – Episode 50 appeared first on In-security Podcast.
52:20
Fr-Agile Development – Episode 49
Episode in
In-Security
EP049 FR-Agile Development
This year’s episode is about Dev-Ops, Agile Development and a couple other interesting development methodologies that are floating around. It’s MOSTLY about Dev-Ops though.
Max found this video series, at the bottom of a dumpster and had me watch them to try and explain what Dev-Ops was. Turns out that I didn’t really get a whole lot out of the video series because frankly they were put in that dumpster for a reason.
This episode was delayed because of a toilet problem. Actually I cover that in the episode in a new segment I like to call “Explaining why the episode was so darned late”
ENJOY!
Originally Recorded August 1, 2018
Shownotes
The post Fr-Agile Development – Episode 49 appeared first on In-security Podcast.
44:49
Intelligent in an artificial kind of way – Episode 48
Episode in
In-Security
EP048 Intelligent in an artificial kind of way
This week it’s Artificial Intelligence and machine learning.
There’s a lot of real cool things being done as computing power gets cheaper and more accessible than ever before.
What kind of impact might this have on infosec and the ongoing battle between blackhats & whitehats?
I honestly think that we talk about that this episode. I don’t really remember since I edited it a little while ago.
But check it oooooout
please?
Originally Recorded June 17, 2018
Shownotes
The post Intelligent in an artificial kind of way – Episode 48 appeared first on In-security Podcast.
41:00
Who put that thing in my internet? – Episode 47
Episode in
In-Security
EP047 Who put that thing in my internet?
Dial in folks, we have ourselves an episode about the internet and things. Or… of things?
The internet of things and their vulnerabilities.
That’s right some times things that make your life easier can come at a price.
A PRICE SO HIGH IT’S STAGGERING!
Then once you’ve saved up that staggering price and buy the thing you find out that there’s another secret hidden price. The one you thought I was talking about originally!!
Whatever man, who writes this nonsense anyways? Geez.
Internet of things devices can have vulnerabilities just like all computers and we’re going to discuss some of them and what you can try to do to get to enjoy these internet of things devices without giving up the whole fishtank!
ENJOY!
Originally Recorded June 6, 2018
Shownotes
The post Who put that thing in my internet? – Episode 47 appeared first on In-security Podcast.
32:05
Tracking U – Episode 46
Episode in
In-Security
EP046 Tracking U
This week we talk about online (spoilers: And offline) tracking and the people who do it.
It’s a banner year at the old in-security family, two count on the podcast front and another on the way?!
We discuss Microsoft, google, facebook and the way they go about collecting data from unsuspecting internet users. We also take an in-depth look at cookies and how they are now used for more than ever intended.
Delicious delicious cookies. Used for tracking? next you’re going to tell me that brownies can be used to get you stoned.
Originally Recorded May 2, 2018
Shownotes
The post Tracking U – Episode 46 appeared first on In-security Podcast.
55:27
Meltdown Inspector – Episode 45
Episode in
In-Security
EP045 Meltdown Inspector
Our first (read: only?) episode for 2018 and we’re ready to talk about Meltdown and Spectre, the new class of hardware vulnerabilities that hadn’t really even been considered prior to this discovery!
We even have some housekeeping in this episode. Who would have thought with like a half year since the last EP that there was any new developments?!
So yeah, we got a lot of great content. This is a delightful reboot. Let’s hope there’s more to come! (this year)
Originally Recorded March 21, 2018
Shownotes
The post Meltdown Inspector – Episode 45 appeared first on In-security Podcast.
43:59
Plain Ketchup – Episode 044
Episode in
In-Security
EP044 Plain Ketchup
Playing catch-up is necessary sometimes. Sometimes life happens. It gets all up in your grill and tries to mess up your best laid plans. When that happens your only choice is to podcast at a much slower pace than expected.
Sometimes life happens all over your Co-Host.
So we have an elegant solution to that. That solution is, of course, to recap everything in one giant recap episode.
We don’t necessarily hit all the points, but we get some of the top ones that we thought were neat.
We don’t necessarily even talk about events more than I go off on a long rambling excuse about why Windows has made my life slightly inconvenient.
Sometimes Windows happens…
But why does it always happen to ME?!
Yeah. That’s not really as important a point here. So anyways.
We have another episode where we are playing catch-up on some of the better topics that happened and as always click the thing below if one of these interests you and we can possibly go more in-depth into it!
Originally Recorded October 12, 2017
Shownotes
The post Plain Ketchup – Episode 044 appeared first on In-security Podcast.
59:51
Don’t Rock the Voting Machines – Episode 043
Episode in
In-Security
EP043 Don’t Rock the Voting Machines
You know that old song? Rock the boat? You know how Rock the VOTE was made popular? We want you to rock the VOTE. Just don’t pick on the voting machines? Something like that at any rate. So that’s what I was going for with this title. We have fallen so far out of practice that at this point we’re just making things up again.
At least at one time we had some sense of what we were doing. Or at least some sense.
That’s all gone.
I don’t miss it.
So yeah. Go vote. You can listen to this episode on your way to the polls, or as you wait.
If you aren’t American there is still value in this episode regardless, replace “voting machine” with “public facing machine”, replace “Counting votes” with “something that is private and shouldn’t be shared or have results tampered with.” and there you go. Baby, You’ve got a stew going. You’ve got a perfectly good show for any country!
So this episode is all about the vulnerabilities in voting machines. We aren’t here to give a historical perspective, though I agree it would be really interesting, We are here to give you the information security side of the coin.
The information security coin.
Originally Recorded November 7th 2016
Shownotes
The post Don’t Rock the Voting Machines – Episode 043 appeared first on In-security Podcast.
27:31
Bloaty and the Superfish – Episode 042
Episode in
In-Security
EP042 Bloaty and the Superfish
Bloatware is out there. Swelling and expanding and taking up your valuable valuable resources and stealing your car keys and taking the family sedan out for joyrides in the middle of the night.
So I guess we should make a podcast explaining it.
DONE! That’s right, We’re going to EXPAND on the topic of BLOATware. Heh. Ugh.
Bloatware is the software installed on your new electronics direct from the manufacturer under the guise of “improving your user experience” In reality it might improve the price you pay slightly but otherwise often has very little benefit.
But we’ll get into that I don’t want to jump the gun.
I don’t want to mislead anyone. We only thought of the title at the end so there are no hootie puns throughout the episode. I am sure we could have included some references to I only wanna be with you or let her cry or something. Those jokes pretty much make themselves when you’re talking bloatware.
In case you’re wondering about Superfish. Yeah, that’s also a thing, I wasn’t just trying to avoid litigation. If you want to know more you should probably fire up your favorite listening device or devices, I am not here to limit you, and give it a digital spin.
Originally Recorded July 6th 2016
Shownotes
The post Bloaty and the Superfish – Episode 042 appeared first on In-security Podcast.
43:16
Handsomeware – Episode 041
Episode in
In-Security
EP041 Handsomeware
This is a new and exciting episode on the topic of Ransomware.
It was the planned episode that we were going to do before life intervened and a show didn’t happen for 4 months.
But it’s here now. So there’s that.
Ransomware, as the name would suggest and as you are about to find out is the thing that you are probably going to experience where someone compromises your computer then asks you for money to either not do something or to undo something they’ve already done.
I’m collecting ideas for the in-security podcast drinking game, so far I think every time there is reference to a movie take a drink. If the movie in question is Sneakers then take two drinks.
I’ve also made up a drinking game specially for this episode. Every time Max says “ransomware” you have to take a drink.
That way you’ll regain consciousness and maybe sober up just in time for the next episode to finally come out!
I’m not sure if it was a running gag on his part but MAN did he go all out.
And just a bit of site news. For some reason our email address wasn’t working. So I managed to fix that and heartily apologize for it. I don’t really know what went wrong, because we definitely tested it before and it was working.
I’m hoping no one is holding our email ransom.
You know, like some kind of ransomware.
That’s right. I’m psyching you up for the episode. ENJOY!
Originally Recorded May 24th 2016
Shownotes
The post Handsomeware – Episode 041 appeared first on In-security Podcast.
46:45
Advertising After 40 – Episode 040
Episode in
In-Security
EP040 Advertising After 40
They says that life begins at 40.
They also say no press is bad press.
They also say a stitch in time saves 9.
When I was a kid I thought that the last one was a reference to some sort of space-time wrinkle. Like how a stitch in your side is a cramp. It was years later that I actually put together the sewing connection. I was a weird kid. I liked science and space and stuff. Fortunately I’ve put all that to use to become a guy who plays the dumb guy on a podcast!
But all that changed with THIS EPISODE. We have decided that since we’ve gotten out of the initial content heavy/dense shows we can probably let me talk about things too. We put that to use in this, our 40th episode. The web advertising episode. We’re going into the hist’ry of advertising on the web and maybe the future? Only time will tell.
While we’re on the topic of telling things, maybe you can tell us what you think of this format, a lot more back and forth I hope tickles your fancies.
Originally Recorded November 30th 2015
Shownotes
The post Advertising After 40 – Episode 040 appeared first on In-security Podcast.
53:35
Log ALL THE THINGS – Episode 039
Episode in
In-Security
EP039 Log ALL THE THINGS
It’s log, it’s log, it’s big, it’s heavy, it’s wood.
It’s log, it’s log, it’s better than bad it’s informative and will help you track down problems and identify failings in your information security!
We’re talking about log files. I know, you’re thinking: But Matt, Why would log files be of any benefit to us. We’re interested in information security and protecting computers!
Well that’s a really weird thing for you to be thinking. Log files are the bread and butter of the information CSI world.
“Now, I’m confused” you’re thinking, “How will Max explain this one?”
Thankfully Max recruited this great guest to get us into the information filled world of logs. This week we have a special guest in the form of Allan Stojanovic. We’re going to get a pretty solid introduction into just why logging is invaluable and get a little insight into how we ought to go about it.
Originally Recorded November 17th 2015
Shownotes
The post Log ALL THE THINGS – Episode 039 appeared first on In-security Podcast.
33:36
Smashley Badison – Episode 038
Episode in
In-Security
EP038 Smashley Badison
By now you’ve either heard of the Avid Life Media breach, which you have mostly only heard of as the Ashley Madison breach, or you are really probably not that into news.
So as we all know, the bad thing has happened to a questionable company.
Avid Life Media, makers of the websites Ashley Madison and Established Men were breached and lost a lot of sensitive information that negatively affected a lot of people. So now that we’ve had some time for the sensationalism to die down let’s try and organize everything into an actual timeline, see what happened and see what we can learn from all this.
The short answer is “don’t trust people with things you want kept secret.” The long answer is something like 36 minutes long and comes in the easy listening format of episode 38 of the in-security podcast.
That’s right.
That’s what we cover this week. Avid Life Media and their devastating data breach.
If the news is to be believed then it wasn’t actually all that devastating to them as a company. But it was totally devastating to the real humans affected.
Originally Recorded October 7th 2015
Shownotes
The post Smashley Badison – Episode 038 appeared first on In-security Podcast.
36:09
Hardware Snoops, Dawg – Episode 037
Episode in
In-Security
EP037 Hardware Snoops, Dawg
Hardware monitoring is getting more and more difficult to manage and mitigate. There’s crazy techniques that can now be employed for increasingly lower overhead. How can we fight this? How can we stop this? How can we weaponize cats?
That’s right folks, We are going to get a little down and dirty in this episode with some discussion on hardware monitoring methods and devices. Freaking lasers? We got that. Animal cruelty? We’ll cover it. Max’s amazingly loud keyboard? Yeah, I’ll talk about it yet again.
I’ll NEVER STOP TALKING ABOUT IT. Until Max does the editing that is…
I’m going to take this moment to add an aside here, if you have any interest in us doing a spoilercast about Mr.Robot discussing the methods and hacks used there please leave a comment, email or tweet us. We’ll be happy to cover it!
Originally Recorded August 20th 2015
Shownotes
The post Hardware Snoops, Dawg – Episode 037 appeared first on In-security Podcast.
27:40
Hackers Getting Hacked – Episode 036
Episode in
In-Security
EP036 Hackers Getting Hacked
Max and I have realized that one can never stay on top of the news because they just keep changing it on us. We were all happy with our USA Patriot act episode but they just couldn’t keep their noses out of the American public’s business. They had to get right back up there.
So we cover the backpedaling on that, then cover a little of the massive and devastating OPM breach and the terrible breach for Hacking Team. An interesting case of Hackers getting hacked and that really should be a sign, if you can’t trust criminals WHO CAN YOU TRUST?!
Lastly I eat a little crow when I have to sort-of re-assess my statement from the previous episode regarding the stance on justice in a little segment we like to call “un-Finnished justice”!
We actually didn’t call it that.
In-fact that joke was too dumb to leave in the episode when I edited it but darned if I can’t slap it in here since no one reads this far into the post!
You’re all just so excited to make with the downloading and get straight to the listening SO HAVE AT IT!
Originally Recorded July 13th 2015
Shownotes
The post Hackers Getting Hacked – Episode 036 appeared first on In-security Podcast.
29:04
Legal Wiretapping – Episode 035
Episode in
In-Security
EP035 Legal Wiretapping
First off: No. We didn’t call the whole show off after Rob Fuller’s interview. Although we thought we’d reached a pinnacle there we quickly realized that the information security news and infotech problems are still going so we might as well too.
In reality we had an unfortunate series of health and scheduling delays.
So the latest episode of course has to cover some of the changes growth and movement since our last podcast which we cover with aplomb!
Eventually we get to brand new content! The content this episode is legal wiretapping! the USA PATRIOT Act has elapsed and been replaced with the USA FREEDOM Act which we look at and clear up a bit of the differences and changes that entails.
While the US has actually moved away from unwarranted wiretapping search and surveillance Canada is moving TOWARDS it?
That’s right. C-51 is Canada’s version of the USA PATRIOT Act. Allowing for wiretapping all over the place. As Canadians we will talk a little about that too!
Originally Recorded June 18th 2015
Shownotes
The post Legal Wiretapping – Episode 035 appeared first on In-security Podcast.
36:28
Open Source Security Architecture Group – Episode 034
Episode in
In-Security
EP034 Open Source Security Architecture Group
Oh boy do we have an episode for you!
This is our first ever interview and with an entertaining guy Rob Fuller also known as Mubix. He took the time to discuss with us (well, Max mostly) The plans for the Open Source Security Architecture Group.
Or at least he tries to once Max gets done his fanboy tirades.
“Well that’s all well and good” you say “But just what is this Open Source Security Architecture Group?” You ask, incredulously.
I mean, if you actually do say either of those two things I should probably get out of podcasting and into prognosticating.
BUT I DIGRESS!
I don’t want to spoil the fun for you because we have the one person on the planet better qualified to explain it to you and that is of course it’s founder and we can have him explain it in the only method better than me writing this blog post and that would be this podcast.
Wow that was a terrible stretch, just listen would you?
Originally Recorded March 11th 2015
Shownotes
The post Open Source Security Architecture Group – Episode 034 appeared first on In-security Podcast.
43:07
Disclosure and Something About Hats – Episode 033
Episode in
In-Security
EP033 Disclosure and Something About Hats
We kick off a whole new year of podcasting about infosec and the computer security field with our first of the year, a timely(?) discussion of bug and vulnerability disclosure and the best practices facing this topic.
Fortunately it was in the forefront of the news this year thanks to the 2 search engine mavens Google and Microsoft. That’s what Microsoft is known for right? It’s search engine?
I think when I search in-security in Bing we’re the third hit so clearly this Google thing is just a passing phase.
Annnnyway. Disclosure is a HUGE part of information Security and this podcast is dedicated to how to do it right, how to do it wrong how to prepare your own company to receive and handle disclosure of vulnerabilities in a responsible and timely manner.
Check it check it check it out!
Originally Recorded January 17th 2015
Shownotes
The post Disclosure and Something About Hats – Episode 033 appeared first on In-security Podcast.
37:59
Sony Breachpocolypse – Episode 032
Episode in
In-Security
EP032 Sony Breachpocolypse
The Sony breach is a pretty big deal followed by, well, everyone. Big enough for us to speculate on (and of course by the time this EP makes it to air there will be more news so expect a part 2.) The in-security guarantee for this is that at the time of recording all the information is as correct as we could make it.
This episode of the podcast contains a bunch of speculation so get ready!
Shownotes
The post Sony Breachpocolypse – Episode 032 appeared first on In-security Podcast.
29:23
You may also like View more
monos estocásticos
monos estocásticos es un podcast sobre inteligencia artificial presentado por Antonio Ortiz (@antonello) y Matías S. Zavia (@matiass).
Sacamos un episodio nuevo cada jueves. Puedes seguirnos en YouTube, LinkedIn y X. Más enlaces en cuonda.com/monos-estocasticos/links
Hacemos todo lo que los monos estocásticos saben hacer: coser secuencias de formas lingüísticas que hemos observado en nuestros vastos datos de entrenamiento según la información probabilística de cómo se combinan. Updated
Inteligencia Artificial con Jon Hernandez
En este Podcast charlamos con gente que esta adoptando o siendo afectada por la IA, el objetivo es traer todos los puntos de vista posibles sobre esta revolución tecnológica que va a cambiar la sociedad. Charlas distendidas y tranquilas sobre temas que nos afectan a todos de la mano de los que más saben o más sufren la IA. Updated
xHUB.AI
En la era de la Inteligencia Artificial, la aplicación en cualquier escenario supone el mayor debate y más importante para el ser humano y su futuro.En el podcast de xHUB.AI hablamos sobre inteligencia artificial y otras ciencias transversales, su aplicación a diferentes sectores y soluciones, con los mejores speakers y especialistas.La Inteligencia Artificial cambiará el mundo y nosotros queremos contartelo.Te lo vas a perder? Updated



