3674 results. Displaying page 1 of 74.


The only Macintosh show you'll ever need. Mac experts Leo Laporte, Kendra Arimoto, Emery Wells, Merlin Mann and Alex Lindsay talk about everything Mac, including hardware, software, pro apps, and...

Jumping Monkeys

Join Megan Morrone, mother of three toddlers, and Leo Laporte, father of two teens, as they talk about parenting in the digital age, featuring lots of helpful links and advice, plus interviews with...

Abby's Road

Join high school senior Abby Laporte and her guests as they offer fresh perspectives on the difficult subjects of teen sex, drugs, decision making, friends, parents, money, driving, new...

TWiT Photo

Professional photographer Catherine Hall and overenthusiastic amateur Leo Laporte chat with some of the world's leading and most inspirational image-makers. Learn tips from acclaimed pros as they...

Know How...

Know How... Get your gaming on! Jason Howell and Ars Technica's Sam Machkovech bring you 12 episodes and cover it all, from tips and tricks, consoles, gaming rigs, controllers, Virtual Reality,...


OMGcraft is your one-stop-shop for everything Minecraft. Discover the big new tips, tricks, and stuff you should know about Minecraft. Hosted by Chad Johnson, this show will make you a Minecraft...

Marketing Mavericks

Marketing Mavericks covers the intersection of marketing and tech. Each week, Tonya Hall interviews top marketing professionals to discuss case studies, communication strategies, and brand insights...

Security Now! Episode 2

This week Steve talks about Microsoft's Strider HoneyMonkey project. It's catching bad guys, but Microsoft isn't sharing the information with the rest of the world. Is it ok to withhold security...

DDoS Attacks

Steve explains how Denial of Service (DOS) attacks happen, and how the newer Distributed Denial of Services attacks (DDoS) have changed the game. Can a router protect you? No. Can a proxy server...

WEP and MAC Address Filtering

In this episode Steve debunks three popular forms of Wi-Fi security: MAC address filtering, WEP encryption, and SSID hiding. He explains why none of these are effective security except against...

Sony/BMG's Rootkit DRM

The Sony/BMG DRM rootkit was first discovered by F-Secure and widely publicized by Mark Russinovich of Sysinternals in his blog. The Sony DRM hides itself by modifying the Windows kernel, names...


In this episode we wrap up Wi-Fi security with a discussion of WPA.


In this episode Steve explains how VPNs can protect you on open Wi-Fi networks. He also announces the WPA password generator.

Your Questions, Steve's Answers

In this episode Steve answers your questions on a variety of security issues including: The best way to store passwords Managing guests on your wireless network Why you should never use a public...

PPTP and IPSec

In this episode Steve continues his quest for the perfect way to secure your connection on the road. In this episode he talks about two secure protocols, PPTP and IPSec, which are commonly used for...


Steve reviews a new, free, VPN solution called Hamachi - and he likes what he sees.


Steve finishes out his search for a way to secure hotspot Internet access with a look at OpenVPN. But first, he responds to some issues from previous shows... Steve offers newsgroup style security...

Your Questions, Steve's Answers #2

On this show we discuss: Logging into secure sites Hamachi troubles Getting WPA security on old wi-fi equipment Securing Windows Remote Desktop The unreliabilty of fingerprint scanners Using Gmail...

Ilfak Guilanov and the WMF Flaw

As we've told you in the past two editions of Security Now! there's a very serious security flaw in all versions of Windows. This hole takes advantage of poor design choice in the Windows metafile...

The WMF Backdoor

Microsoft has patched the WMF vulnerability in Windows 2000 and XP, but in his research for a fix for Windows 95/98/Me Steve has come up with a blockbuster. It is his considered opinion that the...


It's now pretty clear that the ability to execute code in WMF graphics files was intentional - but we may never know why it's there. Steve wraps up the subject, lays a few myths to rest, explains...

Your Questions, Steve's Answers #3

Our monthly question and answer session with Steve Gibson...

How the Internet Works, Pt. 1

Steve talks about the Kama Sutra virus, scheduled to strike tomorrow, and PC World's anti-virus roundup. Then we delve into How the Internet Works, part 1. We'll wrap things up next week.

How the Internet Works, Pt. 2

Part 2 of Steve's discussion of how the fundamental Internet technologies work. This and the previous episode will provide the foundation for our future podcasts on Internet security issues.

How LANs Work, Pt. 1

Steve continues to lay a foundation on understanding networking. This week, part one of how LANs work. We cover DHCP, Subnet Masks, Routers, and hubs. We'll conclude with part two on episode 29.

The Road to 1080p, Part 1

Behind-the-scenes of an HD shoot. See how the next episode of MacBreak is being produced with high-end cameras and, of course, Macs!. The Pixel Corps' Alex Lindsay gives you a tour of the on-set...

Your Questions, Steve's Answers #4

Steve answers your questions on this episide. With further clarification on VPN security, Hamachi, and the answer to the eternal question, which operating system is the most secure.

Ethernet Insecurity

In this week's marathon edition Steve tackles security issues inherent to Ethernet, including ARP spoofing.

Crypto Issues

This week Steve takes a look at how cryptography is used and the difficult issues strong crypto raises.

Crypto 102

This week Steve continues his discussion of crypto with a look at secret decoder rings and one-time pads.

XP on Mac

Ben Durbin of the Pixel Corps followed the instructions at and got Windows XP running on one of the new Intel Mac Minis just like that. This is no kludge - it runs very well. No network...

Your Questions, Steve's Answers #5

Episode 32 is our monthly question and answer session.

Symmetric Block Ciphers

Part three of Steve's overview of cryptography looks at symmetric block ciphers.

Public Key Cryptography

This week Steve explains how public key cryptography works, and we welcome our new sponsor, Astaro! Thanks so much for the support guys.

Video Compression with QuickTime Pro

In this episode, MacBreak hosts Alex Lindsay and Emery Wells discuss video compression techniques and strategies for creating high-quality videos with the smallest file size possible.

Your Questions, Steve's Answers #6

As usual on every fourth episode, Steve answers listener questions.

Primes and Certificates

We wrap up our talk about cryptography with a discussion of prime number generation, key recovery, and digital certificates.

The Road to 1080p, Part 3

Our final look behind-the-scenes at MacBreak as Alex shows us how episodes are composited in Apple Shake.

Browser Security

Why is Internet Explorer so insecure? What can you do to secure it? And why is it so hard to make a secure browser? Steve talks about security policy vs. browser flaws, how he uses IE safely, and...

Enter the Automatrix

Apple's Applescript Product Manager, Sal Soghoian, make Automator jump through hoops.

Buffer Overflows

Buffer overflows... they're the most common kind of security flaw, but what are they and how do they happen? Finally, how can we protect ourselves from them? Steve explains all.

Your Questions, Steve's Answers #7

As he does every fourth episode, Steve answers your questions. But first, an update on some recent security news...


The ultimate encryption program, free, open source, strong, and flexible: Truecrypt.


Leo and Emery show you how to use Transmit, the award-winning FTP software from Panic Software.

NAT Traversal

Steve explains the clever technique that Skype and other programs use to end around NAT routers.

Email Encryption

Leo and Emery survey the available tools and techniques for keeping email secure and private on your Mac.


Ever wonder what a port is? Steve explains what they are and what terms like "stealth ports" and "port sniffing mean." Leo reads a little poetry.

Automator Life Poster

Leo and Automator guru Sal Soghoian show you how to use Automator and iPhoto to create a poster-sized collection of your photos.

Photoshop CS2 RAW

Leo and guest Mikkel Aaland discuss the advantages of shooting photos in the RAW format and manipulating RAW images in Photoshop CS2.

Internet Weaponry

This week Steve tells us about distributed denial of service attacks and how hackers use IRC botnets to create them.