Schedule

Schedule

Tuesday, September 23

1411491600 Tech News Today
1411495200 MacBreak Weekly
1411502400 Security Now
1411509600 Before You Buy
1411513200 Tech News 2Night
1411516800 All About Android
1411525800 Padre's Corner

Wednesday, September 24

1411572600 FLOSS Weekly
1411578000 Tech News Today
1411581600 Windows Weekly
1411588800 This Week in Google
1411599600 Tech News 2Night
1411601400 redditUP
1411606800 Ham Nation

Thursday, September 25

1411664400 Tech News Today
1411668000 Know How...
1411671600 The Social Hour
1411677000 Coding 101
1411680600 Home Theater Geeks
1411686000 Tech News 2Night
1411687800 The Giz Wiz
1411696800 OMGcraft

Friday, September 26

1411750800 Tech News Today
1411754400 This Week in Law
1411761600 Android App Arena
1411772400 Tech News 2Night

Saturday, September 27

1411840800 The Tech Guy

Sunday, September 28

1411927200 The Tech Guy
1411941600 This Week in Tech

Monday, September 29

1412010000 Tech News Today
1412013600 Triangulation
1412019000 iPad Today
1412031600 Tech News 2Night
1412033400 Marketing Mavericks

Tuesday, September 30

1412096400 Tech News Today
1412100000 MacBreak Weekly
1412107200 Security Now
1412114400 Before You Buy
1412118000 Tech News 2Night
1412121600 All About Android
1412130600 Padre's Corner

Wednesday, October 1

1412177400 FLOSS Weekly
1412182800 Tech News Today
1412186400 Windows Weekly
1412193600 This Week in Google
1412204400 Tech News 2Night
1412206200 redditUP
1412211600 Ham Nation

Thursday, October 2

1412269200 Tech News Today
1412272800 Know How...
1412276400 The Social Hour
1412281800 Coding 101
1412285400 Home Theater Geeks
1412290800 Tech News 2Night
1412292600 The Giz Wiz
1412301600 OMGcraft

Most Recent Episodes

Marketing Mavericks
Episode #24: UnMarketing September 22nd, 2014

How the Ritz-Carlton went the extra mile, how to make a viral video, and more.

This Week in Enterprise Tech

The iGuardian

iPad Today

iPhone 6 Plus vs. iPad mini, Adobe buys Aviary

Tech News 2Night

iPhone 6 Breaks Sales Record

Triangulation
Episode #168: Dan "Shoe" Hsu September 22nd, 2014

Editor-in-chief of GamesBeat.

Tech News Today
Episode #1097: Duck Duck No Go September 22nd, 2014

The privacy-oriented search engine, DuckDuckGo,has been blocked in China by the Chinese government.

This Week in Tech
Episode #476: Brain in a Jar September 21st, 2014

Apple gold, warrant canaries, Fire for kids, Larry Ellison's island, and more.

The Tech Guy
The Tech Guy 1120 September 21st, 2014

Are iOS alternate keyboards secure?

The Tech Guy
The Tech Guy 1119 September 20th, 2014

Where is the best place to buy a gaming PC?

Tech News 2Night

Selling Drugs on Instagram

Know How... 89

Heartbleed, LastPass, and Make Windows Faster

April 17 2014

The Heartbleed exploit explained with jellybeans, tweak Windows 7 or 8 for extra speed, manage your passwords with LastPass, and a first look at the WRT 1900AC.

Heatbleed

What is the Hearbeat?
* The problem lies in the "Hearbeart"
- It's a way to keep a SECURE TLS session alive /// to keep it from "timing out"
- The Heartbeat is a payload of arbitrary data which is sent from one end of the connection to the other, and back again.
- If the heartbeat makes the round trip intact, then both sides of the connection know that the connection is still active and still secure.

What is the Exploit?
* The exploit is in the way that OpenSSL responds to the heartbeat.
- The SENDER of the "keep alive" packet gets to decide how much arbitrary data it sends.
-- The sender sends heartbeat of a certain size, then tells the receiver how much data must be sent back
*** Here's the rub... along with that data, the sender tells the receiver (running OpenSSL) how much data should be sent back... and OpenSSL doesn't check that number with the size of the incoming data.
-- Since the SENDER decides how big the arbitrary heatbeat data will be, and because OpenSSL trusts the sender as to how much data is in that heartbeat, the SENDER can sent a heartbeat that will return data that was NOT originally sent by the sender.
-- In other words, an attacker can make the compromised system send data that was intended to be secure and private.

How is the Exploit Used?
* To use the exploit, an attacker would first establish a SSL connection to a compromised system.
* The attacker would then send a heartbeat to the compromised system with a 1byte payload
* However, the attacker tells the compromised system that it must return 64k Bytes
* The compromised system sends back a 64k heartbeat response, giving the attacker 63,999 bytes of data that is SHOULDN'T have released.
* The attacker keeps doing the attack until they have the compromised systems certificates and any other information that is in memory.

What is the impact
* If the attacker is able to steal the credentials of the compromised system, they are able to do a number of things:
1. A MITM attack on people connecting to the site -- An attack in which EVERYTHING is in the clear
2. The ability to create "spoof sites" with the authentic certificate of the compromised site

Speed Up Windows

"Remote Assistance" is a service that runs in the background of Windows 7 & 8, allows a remote "helper" to log into your computer to fix problems while you watch. Most people will never never use the service, and it can actually be a security hole.

"System Restore" is a background service that keeps track of "save points" - Theoretically it will allow you to return to one of these "healthy" save points should something happen to your OS. It's a useful feature of Windows, but it CAN'T clear viruses and it can only return to save points that is has created... meaning that it almost never gets you back to a completely healthy image.

To Turn Off these Services
1. Right click the "Computer" icon on the desktop and choose "Properties"
2. To the left of you computer's stats, you'll see "Control Panel Home" along with four shielded options. Click "Remote Settings"
3. You'll see a field for "Allow Remote Assistance Connections to this computer"- uncheck that option and click "apply".
4. Click on the "Remote Assistance" tab and look for "Protection Settings" - Select the drive on which protection in enabled and click "Configure"
5. Select the radio button to "Turn off system protection" and apply the change.

LastPass Password Manager

- After the Heartbleed security breech and just everyday use of Multi-site logins, you should be using strong passwords and different passwords for every site.
- Lastpass keeps your passwords in a Vault and helps you generate new random passwords and works on all platforms
- Your passwords are encrypted, which is only stored on your machine. That means even LastPass doesn't know your password. It's called the "Trust No One" approach
- Don't believe me? Watch Leo and Steve Gibson go into detail not only about Heartbleed but Lastpass and Trucypt

Leo's introduction to LastPass on TWiT Live Specials

Security Now Episode: 450 & 451, Leo & Steve go into detail about Heartbleed & more.

Security Now Episode: 450

LastPass Security Page
LastPass FAQ
LastPass "Heartbleed" Blog Post

Install LastPass and Start saving Passwords
- Lastpass has extensions for Chrome, Firefox, Safari and works for all platforms, Windows, OS X, Linux, and Mobile OS like iOS, Android Windows Phone and even Blackberry...

Audit and Update your Passwords
- Make sure not to save your passwords in the browser options, and start using LastPass
- Lastpass can scan your passwords and give you a rating and show you sites thave have duplicate passwords
- It'll even tell you if any of your Usernames have been used in a Security breach

How do you improve your score?
- Eliminate Duplicate Passwords
- Weak Passwords
- Don't store passwords in email, docs, pieces of paper, your hand...

Install on your Mobile Devices
- Login with your Lastpass password. Before a recent update you use to have to log into Lastpass and use their web browser through the app. But not anymore!
- Lastpass will help you log into apps without having to copy it from the Lastpass app.

Alternitives

1Password $34.99

KeePass (Free)

Linksys Router Madness!

WRT54G
* 2.4Ghz Only
* 10/100 LAN & WAN Ports
* Broadcom 125Mhz processor (updated to 216Mhz)
* 4MB Flash Storage // 16MB System Memory (Later Versions had 2MB / 8MB)
* No external storage options

Linksys WRT1900AC
* 2.4 & 5 Ghz SIMULTANEOUSLY
* 802.11a/b/g/n/ac
* Beamforming Tech
* 4 Gigabit LAN Ports
* 1 Gigabit WAN Port
* Dual Core 1.2Ghz CPU
* 128MB Flash Storage // 256MB DDR3 System Memory
* USB 3.0 & eSATA connectors // Support of FAT/NTFS/HFS

Connect with us!
Don't forget to check out our large library of projects on this site. If you want to search for a topic, try this custom search engine. Also, check out our transcripts.
- Google+ Community at gplus.to/twitkh
- Tweet at us at @padresj and @Cranky_Hippo
- Email us at knowhow@twit.tv