Schedule

Schedule

Friday, December 19

1419012000 Tech News Today
1419015600 This Week in Law
1419033600 Tech News 2Night

Saturday, December 20

1419102000 The Tech Guy

Sunday, December 21

1419188400 The Tech Guy
1419202800 This Week in Tech

Monday, December 22

1419271200 Tech News Today
1419274800 Triangulation
1419280200 iPad Today
1419292800 Tech News 2Night

Tuesday, December 23

1419357600 Tech News Today
1419361200 MacBreak Weekly
1419368400 Security Now
1419375600 Before You Buy
1419379200 Tech News 2Night
1419382800 All About Android
1419391800 Padre's Corner

Wednesday, December 24

1419444000 Tech News Today
1419447600 Windows Weekly
1419454800 This Week in Google
1419465600 Tech News 2Night

Thursday, December 25

1419530400 Tech News Today
1419534000 Know How...
1419537600 Marketing Mavericks
1419543000 Coding 101
1419546600 Home Theater Geeks
1419553800 The Giz Wiz

Friday, December 26

1419616800 Tech News Today
1419638400 Tech News 2Night

Saturday, December 27

1419706800 The Tech Guy

Sunday, December 28

1419793200 The Tech Guy
1419807600 This Week in Tech

Most Recent Episodes

The Giz Wiz
Episode #1498: Inflate My Ego December 18th, 2014

TalkBand, disco lights, inflatable chair, and more!

Home Theater Geeks

Multichannel audio, speaker placement, and multiple subwoofers.

Tech News 2Night

A Security Flaw in Millions of Routers

Coding 101

Polishing up the holiday pricer.

Marketing Mavericks
Episode #35: Game of Drones December 18th, 2014

Taking an idea and taking off with it

Know How...

In case you didn't know this is Episode 123

Tech News Today

Hollywood caves in the face of threats from the Sony hackers.

Ham Nation

Ham Emergency Radio Operations(H.E.R.O) lends aid in the recent Philippine typhoon.

This Week in Google
Episode #280: Sony Pictureless December 17th, 2014

Project Goliath: Inside Hollywood's secret war against Google

iFive for the iPhone

New Instagram filters, iMovie vertical video fix

Security Now 10

Wireless Access Points

October 20 2005
In this episode we discuss security concerns with wireless access points.

First, we revisit last week's podcast on rootkits. After doing the show we tested RootkitRevealer on a number of machines and discovered numerous false positives. For example, Norton's Protected Trashcan uses rootkit technology to hide files from other programs. Kaspersky Anti-Virus also shows up as a rootkit. Neither are security risks.

Now on to wireless access points. Leo used NetStumber to look at unprotected systems in his small town. Two-thirds were open, whether intentionally or not. If you're a home user turn on WPA encryption to protect yourself from snoops and block attempts to hack your system.

If you're using an open access point at a coffee shop, hotel, airport, and so on, you are at risk. If you're using SSL for email, or logging into a secure server (like your bank or Amazon.com's store) you're data, including the form, is protected. Otherwise, your data is visible. Anyone using a packet sniffer like Ethereal can see your data. Protect yourself by using your corporate VPN to encrypt your session, or subscribe to a VPN service like Anonymizer, HotspotVPN.com, or PublicVPN.com. An SSL-based service will pose fewer configuration and firewall issues than a VPN using IPSEC or PPTP.