Schedule

Schedule

Tuesday, October 21

1413910800 Tech News Today
1413914400 MacBreak Weekly
1413921600 Security Now
1413928800 Before You Buy
1413932400 Tech News 2Night
1413936000 All About Android
1413945000 Padre's Corner

Wednesday, October 22

1413991800 FLOSS Weekly
1413997200 Tech News Today
1414000800 Windows Weekly
1414008000 This Week in Google
1414018800 Tech News 2Night
1414026000 Ham Nation

Thursday, October 23

1414083600 Tech News Today
1414087200 Know How...
1414090800 Marketing Mavericks
1414096200 Coding 101
1414099800 Home Theater Geeks
1414105200 Tech News 2Night
1414107000 The Giz Wiz

Friday, October 24

1414170000 Tech News Today
1414173600 This Week in Law
1414180800 Android App Arena
1414191600 Tech News 2Night

Saturday, October 25

1414260000 The Tech Guy

Sunday, October 26

1414346400 The Tech Guy
1414360800 This Week in Tech

Monday, October 27

1414429200 Tech News Today
1414432800 Triangulation
1414438200 iPad Today
1414450800 Tech News 2Night

Tuesday, October 28

1414515600 Tech News Today
1414519200 MacBreak Weekly
1414526400 Security Now
1414533600 Before You Buy
1414537200 Tech News 2Night
1414540800 All About Android
1414549800 Padre's Corner

Wednesday, October 29

1414596600 FLOSS Weekly
1414602000 Tech News Today
1414605600 Windows Weekly
1414612800 This Week in Google
1414623600 Tech News 2Night
1414630800 Ham Nation

Thursday, October 30

1414688400 Tech News Today
1414692000 Know How...
1414695600 Marketing Mavericks
1414701000 Coding 101
1414704600 Home Theater Geeks
1414710000 Tech News 2Night
1414711800 The Giz Wiz

Most Recent Episodes

iPad Today

Clips for smart copy/paste, Flickr's new iPad app, iOS 8.1

This Week in Enterprise Tech

Enterprise Storage with Howard Marks

Tech News 2Night

iOS 8.1 is now available

Triangulation

Writer, editor, and professional bohemian.

Tech News Today

Reports claim that the Chinese government is intercepting connections to Apple's iCloud from China.

This Week in Tech
Episode #480: And. Roid. October 19th, 2014

Apple Pay, Twitter turmoil, cable chaos, and more.

The Tech Guy
The Tech Guy 1128 October 19th, 2014

OS X Yosemite, Android Lollipop, and more.

The Tech Guy
The Tech Guy 1127 October 18th, 2014

Could a neighbor's Wi-Fi affect my Wi-Fi reliability?

Tech News 2Night

Snapchat feeds will soon have ads.

This Week in Law
Episode #279: Blame Kevin October 17th, 2014

Should parents be responsible for what their kids do online?

Know How... 89

Heartbleed, LastPass, and Make Windows Faster

April 17 2014

The Heartbleed exploit explained with jellybeans, tweak Windows 7 or 8 for extra speed, manage your passwords with LastPass, and a first look at the WRT 1900AC.

Heatbleed

What is the Hearbeat?
* The problem lies in the "Hearbeart"
- It's a way to keep a SECURE TLS session alive /// to keep it from "timing out"
- The Heartbeat is a payload of arbitrary data which is sent from one end of the connection to the other, and back again.
- If the heartbeat makes the round trip intact, then both sides of the connection know that the connection is still active and still secure.

What is the Exploit?
* The exploit is in the way that OpenSSL responds to the heartbeat.
- The SENDER of the "keep alive" packet gets to decide how much arbitrary data it sends.
-- The sender sends heartbeat of a certain size, then tells the receiver how much data must be sent back
*** Here's the rub... along with that data, the sender tells the receiver (running OpenSSL) how much data should be sent back... and OpenSSL doesn't check that number with the size of the incoming data.
-- Since the SENDER decides how big the arbitrary heatbeat data will be, and because OpenSSL trusts the sender as to how much data is in that heartbeat, the SENDER can sent a heartbeat that will return data that was NOT originally sent by the sender.
-- In other words, an attacker can make the compromised system send data that was intended to be secure and private.

How is the Exploit Used?
* To use the exploit, an attacker would first establish a SSL connection to a compromised system.
* The attacker would then send a heartbeat to the compromised system with a 1byte payload
* However, the attacker tells the compromised system that it must return 64k Bytes
* The compromised system sends back a 64k heartbeat response, giving the attacker 63,999 bytes of data that is SHOULDN'T have released.
* The attacker keeps doing the attack until they have the compromised systems certificates and any other information that is in memory.

What is the impact
* If the attacker is able to steal the credentials of the compromised system, they are able to do a number of things:
1. A MITM attack on people connecting to the site -- An attack in which EVERYTHING is in the clear
2. The ability to create "spoof sites" with the authentic certificate of the compromised site

Speed Up Windows

"Remote Assistance" is a service that runs in the background of Windows 7 & 8, allows a remote "helper" to log into your computer to fix problems while you watch. Most people will never never use the service, and it can actually be a security hole.

"System Restore" is a background service that keeps track of "save points" - Theoretically it will allow you to return to one of these "healthy" save points should something happen to your OS. It's a useful feature of Windows, but it CAN'T clear viruses and it can only return to save points that is has created... meaning that it almost never gets you back to a completely healthy image.

To Turn Off these Services
1. Right click the "Computer" icon on the desktop and choose "Properties"
2. To the left of you computer's stats, you'll see "Control Panel Home" along with four shielded options. Click "Remote Settings"
3. You'll see a field for "Allow Remote Assistance Connections to this computer"- uncheck that option and click "apply".
4. Click on the "Remote Assistance" tab and look for "Protection Settings" - Select the drive on which protection in enabled and click "Configure"
5. Select the radio button to "Turn off system protection" and apply the change.

LastPass Password Manager

- After the Heartbleed security breech and just everyday use of Multi-site logins, you should be using strong passwords and different passwords for every site.
- Lastpass keeps your passwords in a Vault and helps you generate new random passwords and works on all platforms
- Your passwords are encrypted, which is only stored on your machine. That means even LastPass doesn't know your password. It's called the "Trust No One" approach
- Don't believe me? Watch Leo and Steve Gibson go into detail not only about Heartbleed but Lastpass and Trucypt

Leo's introduction to LastPass on TWiT Live Specials

Security Now Episode: 450 & 451, Leo & Steve go into detail about Heartbleed & more.

Security Now Episode: 450

LastPass Security Page
LastPass FAQ
LastPass "Heartbleed" Blog Post

Install LastPass and Start saving Passwords
- Lastpass has extensions for Chrome, Firefox, Safari and works for all platforms, Windows, OS X, Linux, and Mobile OS like iOS, Android Windows Phone and even Blackberry...

Audit and Update your Passwords
- Make sure not to save your passwords in the browser options, and start using LastPass
- Lastpass can scan your passwords and give you a rating and show you sites thave have duplicate passwords
- It'll even tell you if any of your Usernames have been used in a Security breach

How do you improve your score?
- Eliminate Duplicate Passwords
- Weak Passwords
- Don't store passwords in email, docs, pieces of paper, your hand...

Install on your Mobile Devices
- Login with your Lastpass password. Before a recent update you use to have to log into Lastpass and use their web browser through the app. But not anymore!
- Lastpass will help you log into apps without having to copy it from the Lastpass app.

Alternitives

1Password $34.99

KeePass (Free)

Linksys Router Madness!

WRT54G
* 2.4Ghz Only
* 10/100 LAN & WAN Ports
* Broadcom 125Mhz processor (updated to 216Mhz)
* 4MB Flash Storage // 16MB System Memory (Later Versions had 2MB / 8MB)
* No external storage options

Linksys WRT1900AC
* 2.4 & 5 Ghz SIMULTANEOUSLY
* 802.11a/b/g/n/ac
* Beamforming Tech
* 4 Gigabit LAN Ports
* 1 Gigabit WAN Port
* Dual Core 1.2Ghz CPU
* 128MB Flash Storage // 256MB DDR3 System Memory
* USB 3.0 & eSATA connectors // Support of FAT/NTFS/HFS

Connect with us!
Don't forget to check out our large library of projects on this site. If you want to search for a topic, try this custom search engine. Also, check out our transcripts.
- Google+ Community at gplus.to/twitkh
- Tweet at us at @padresj and @Cranky_Hippo
- Email us at knowhow@twit.tv